Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2016-2161 (GCVE-0-2016-2161)
Vulnerability from cvelistv5 – Published: 2017-07-27 21:00 – Updated: 2024-09-16 22:02- CWE-823 - Use of Out-of-range Pointer Offset (CWE-823)
| Vendor | Product | Version | |
|---|---|---|---|
| Apache Software Foundation | Apache HTTP Server |
Affected:
2.4.0 to 2.4.23
|
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-05T23:17:50.587Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://support.apple.com/HT208221"
},
{
"name": "95076",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/95076"
},
{
"name": "DSA-3796",
"tags": [
"vendor-advisory",
"x_refsource_DEBIAN",
"x_transferred"
],
"url": "http://www.debian.org/security/2017/dsa-3796"
},
{
"name": "1037508",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK",
"x_transferred"
],
"url": "http://www.securitytracker.com/id/1037508"
},
{
"name": "RHSA-2017:1413",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT",
"x_transferred"
],
"url": "https://access.redhat.com/errata/RHSA-2017:1413"
},
{
"name": "RHSA-2017:1161",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT",
"x_transferred"
],
"url": "https://access.redhat.com/errata/RHSA-2017:1161"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://www.tenable.com/security/tns-2017-04"
},
{
"name": "RHSA-2017:1414",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT",
"x_transferred"
],
"url": "https://access.redhat.com/errata/RHSA-2017:1414"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbux03725en_us"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2016-2161"
},
{
"name": "RHSA-2017:1415",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT",
"x_transferred"
],
"url": "http://rhn.redhat.com/errata/RHSA-2017-1415.html"
},
{
"name": "RHSA-2017:0906",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT",
"x_transferred"
],
"url": "https://access.redhat.com/errata/RHSA-2017:0906"
},
{
"name": "GLSA-201701-36",
"tags": [
"vendor-advisory",
"x_refsource_GENTOO",
"x_transferred"
],
"url": "https://security.gentoo.org/glsa/201701-36"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://security.netapp.com/advisory/ntap-20180423-0001/"
},
{
"name": "[httpd-cvs] 20190815 svn commit: r1048743 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
"tags": [
"mailing-list",
"x_refsource_MLIST",
"x_transferred"
],
"url": "https://lists.apache.org/thread.html/56c2e7cc9deb1c12a843d0dc251ea7fd3e7e80293cde02fcd65286ba%40%3Ccvs.httpd.apache.org%3E"
},
{
"name": "[httpd-cvs] 20190815 svn commit: r1048742 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
"tags": [
"mailing-list",
"x_refsource_MLIST",
"x_transferred"
],
"url": "https://lists.apache.org/thread.html/84a3714f0878781f6ed84473d1a503d2cc382277e100450209231830%40%3Ccvs.httpd.apache.org%3E"
},
{
"name": "[httpd-cvs] 20200401 svn commit: r1058586 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
"tags": [
"mailing-list",
"x_refsource_MLIST",
"x_transferred"
],
"url": "https://lists.apache.org/thread.html/rd18c3c43602e66f9cdcf09f1de233804975b9572b0456cc582390b6f%40%3Ccvs.httpd.apache.org%3E"
},
{
"name": "[httpd-cvs] 20200401 svn commit: r1058587 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
"tags": [
"mailing-list",
"x_refsource_MLIST",
"x_transferred"
],
"url": "https://lists.apache.org/thread.html/re3d27b6250aa8548b8845d314bb8a350b3df326cacbbfdfe4d455234%40%3Ccvs.httpd.apache.org%3E"
},
{
"name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
"tags": [
"mailing-list",
"x_refsource_MLIST",
"x_transferred"
],
"url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E"
},
{
"name": "[httpd-cvs] 20210330 svn commit: r1073140 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
"tags": [
"mailing-list",
"x_refsource_MLIST",
"x_transferred"
],
"url": "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a%40%3Ccvs.httpd.apache.org%3E"
},
{
"name": "[httpd-cvs] 20210330 svn commit: r1888194 [10/13] - /httpd/site/trunk/content/security/json/",
"tags": [
"mailing-list",
"x_refsource_MLIST",
"x_transferred"
],
"url": "https://lists.apache.org/thread.html/re1e3a24664d35bcd0a0e793e0b5fc6ca6c107f99a1b2c545c5d4b467%40%3Ccvs.httpd.apache.org%3E"
},
{
"name": "[httpd-cvs] 20210330 svn commit: r1073139 [10/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
"tags": [
"mailing-list",
"x_refsource_MLIST",
"x_transferred"
],
"url": "https://lists.apache.org/thread.html/r04e89e873d54116a0635ef2f7061c15acc5ed27ef7500997beb65d6f%40%3Ccvs.httpd.apache.org%3E"
},
{
"name": "[httpd-cvs] 20210330 svn commit: r1073149 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
"tags": [
"mailing-list",
"x_refsource_MLIST",
"x_transferred"
],
"url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E"
},
{
"name": "[httpd-cvs] 20210330 svn commit: r1073146 [3/3] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities-httpd.xml security/vulnerabilities_22.html security/vulnerabilities_24.html",
"tags": [
"mailing-list",
"x_refsource_MLIST",
"x_transferred"
],
"url": "https://lists.apache.org/thread.html/rcc44594d4d6579b90deccd4536b5d31f099ef563df39b094be286b9e%40%3Ccvs.httpd.apache.org%3E"
},
{
"name": "[httpd-cvs] 20210330 svn commit: r1073149 [10/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
"tags": [
"mailing-list",
"x_refsource_MLIST",
"x_transferred"
],
"url": "https://lists.apache.org/thread.html/rb14daf9cc4e28d18cdc15d6a6ca74e565672fabf7ad89541071d008b%40%3Ccvs.httpd.apache.org%3E"
},
{
"name": "[httpd-cvs] 20210603 svn commit: r1075360 [3/3] - in /websites/staging/httpd/trunk/content: ./ security/json/CVE-2021-31618.json security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
"tags": [
"mailing-list",
"x_refsource_MLIST",
"x_transferred"
],
"url": "https://lists.apache.org/thread.html/rd336919f655b7ff309385e34a143e41c503e133da80414485b3abcc9%40%3Ccvs.httpd.apache.org%3E"
},
{
"name": "[httpd-cvs] 20210606 svn commit: r1075470 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/json/CVE-2020-13938.json security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
"tags": [
"mailing-list",
"x_refsource_MLIST",
"x_transferred"
],
"url": "https://lists.apache.org/thread.html/r76142b8c5119df2178be7c2dba88fde552eedeec37ea993dfce68d1d%40%3Ccvs.httpd.apache.org%3E"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "Apache HTTP Server",
"vendor": "Apache Software Foundation",
"versions": [
{
"status": "affected",
"version": "2.4.0 to 2.4.23"
}
]
}
],
"datePublic": "2016-12-20T00:00:00.000Z",
"descriptions": [
{
"lang": "en",
"value": "In Apache HTTP Server versions 2.4.0 to 2.4.23, malicious input to mod_auth_digest can cause the server to crash, and each instance continues to crash even for subsequently valid requests."
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-823",
"description": "Use of Out-of-range Pointer Offset (CWE-823)",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2021-06-06T10:11:05.000Z",
"orgId": "f0158376-9dc2-43b6-827c-5f631a4d8d09",
"shortName": "apache"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://support.apple.com/HT208221"
},
{
"name": "95076",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/95076"
},
{
"name": "DSA-3796",
"tags": [
"vendor-advisory",
"x_refsource_DEBIAN"
],
"url": "http://www.debian.org/security/2017/dsa-3796"
},
{
"name": "1037508",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK"
],
"url": "http://www.securitytracker.com/id/1037508"
},
{
"name": "RHSA-2017:1413",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "https://access.redhat.com/errata/RHSA-2017:1413"
},
{
"name": "RHSA-2017:1161",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "https://access.redhat.com/errata/RHSA-2017:1161"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://www.tenable.com/security/tns-2017-04"
},
{
"name": "RHSA-2017:1414",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "https://access.redhat.com/errata/RHSA-2017:1414"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbux03725en_us"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2016-2161"
},
{
"name": "RHSA-2017:1415",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "http://rhn.redhat.com/errata/RHSA-2017-1415.html"
},
{
"name": "RHSA-2017:0906",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "https://access.redhat.com/errata/RHSA-2017:0906"
},
{
"name": "GLSA-201701-36",
"tags": [
"vendor-advisory",
"x_refsource_GENTOO"
],
"url": "https://security.gentoo.org/glsa/201701-36"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://security.netapp.com/advisory/ntap-20180423-0001/"
},
{
"name": "[httpd-cvs] 20190815 svn commit: r1048743 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
"tags": [
"mailing-list",
"x_refsource_MLIST"
],
"url": "https://lists.apache.org/thread.html/56c2e7cc9deb1c12a843d0dc251ea7fd3e7e80293cde02fcd65286ba%40%3Ccvs.httpd.apache.org%3E"
},
{
"name": "[httpd-cvs] 20190815 svn commit: r1048742 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
"tags": [
"mailing-list",
"x_refsource_MLIST"
],
"url": "https://lists.apache.org/thread.html/84a3714f0878781f6ed84473d1a503d2cc382277e100450209231830%40%3Ccvs.httpd.apache.org%3E"
},
{
"name": "[httpd-cvs] 20200401 svn commit: r1058586 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
"tags": [
"mailing-list",
"x_refsource_MLIST"
],
"url": "https://lists.apache.org/thread.html/rd18c3c43602e66f9cdcf09f1de233804975b9572b0456cc582390b6f%40%3Ccvs.httpd.apache.org%3E"
},
{
"name": "[httpd-cvs] 20200401 svn commit: r1058587 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
"tags": [
"mailing-list",
"x_refsource_MLIST"
],
"url": "https://lists.apache.org/thread.html/re3d27b6250aa8548b8845d314bb8a350b3df326cacbbfdfe4d455234%40%3Ccvs.httpd.apache.org%3E"
},
{
"name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
"tags": [
"mailing-list",
"x_refsource_MLIST"
],
"url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E"
},
{
"name": "[httpd-cvs] 20210330 svn commit: r1073140 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
"tags": [
"mailing-list",
"x_refsource_MLIST"
],
"url": "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a%40%3Ccvs.httpd.apache.org%3E"
},
{
"name": "[httpd-cvs] 20210330 svn commit: r1888194 [10/13] - /httpd/site/trunk/content/security/json/",
"tags": [
"mailing-list",
"x_refsource_MLIST"
],
"url": "https://lists.apache.org/thread.html/re1e3a24664d35bcd0a0e793e0b5fc6ca6c107f99a1b2c545c5d4b467%40%3Ccvs.httpd.apache.org%3E"
},
{
"name": "[httpd-cvs] 20210330 svn commit: r1073139 [10/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
"tags": [
"mailing-list",
"x_refsource_MLIST"
],
"url": "https://lists.apache.org/thread.html/r04e89e873d54116a0635ef2f7061c15acc5ed27ef7500997beb65d6f%40%3Ccvs.httpd.apache.org%3E"
},
{
"name": "[httpd-cvs] 20210330 svn commit: r1073149 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
"tags": [
"mailing-list",
"x_refsource_MLIST"
],
"url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E"
},
{
"name": "[httpd-cvs] 20210330 svn commit: r1073146 [3/3] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities-httpd.xml security/vulnerabilities_22.html security/vulnerabilities_24.html",
"tags": [
"mailing-list",
"x_refsource_MLIST"
],
"url": "https://lists.apache.org/thread.html/rcc44594d4d6579b90deccd4536b5d31f099ef563df39b094be286b9e%40%3Ccvs.httpd.apache.org%3E"
},
{
"name": "[httpd-cvs] 20210330 svn commit: r1073149 [10/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
"tags": [
"mailing-list",
"x_refsource_MLIST"
],
"url": "https://lists.apache.org/thread.html/rb14daf9cc4e28d18cdc15d6a6ca74e565672fabf7ad89541071d008b%40%3Ccvs.httpd.apache.org%3E"
},
{
"name": "[httpd-cvs] 20210603 svn commit: r1075360 [3/3] - in /websites/staging/httpd/trunk/content: ./ security/json/CVE-2021-31618.json security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
"tags": [
"mailing-list",
"x_refsource_MLIST"
],
"url": "https://lists.apache.org/thread.html/rd336919f655b7ff309385e34a143e41c503e133da80414485b3abcc9%40%3Ccvs.httpd.apache.org%3E"
},
{
"name": "[httpd-cvs] 20210606 svn commit: r1075470 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/json/CVE-2020-13938.json security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
"tags": [
"mailing-list",
"x_refsource_MLIST"
],
"url": "https://lists.apache.org/thread.html/r76142b8c5119df2178be7c2dba88fde552eedeec37ea993dfce68d1d%40%3Ccvs.httpd.apache.org%3E"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "security@apache.org",
"DATE_PUBLIC": "2016-12-20T00:00:00",
"ID": "CVE-2016-2161",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "Apache HTTP Server",
"version": {
"version_data": [
{
"version_value": "2.4.0 to 2.4.23"
}
]
}
}
]
},
"vendor_name": "Apache Software Foundation"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "In Apache HTTP Server versions 2.4.0 to 2.4.23, malicious input to mod_auth_digest can cause the server to crash, and each instance continues to crash even for subsequently valid requests."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Use of Out-of-range Pointer Offset (CWE-823)"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://support.apple.com/HT208221",
"refsource": "CONFIRM",
"url": "https://support.apple.com/HT208221"
},
{
"name": "95076",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/95076"
},
{
"name": "DSA-3796",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2017/dsa-3796"
},
{
"name": "1037508",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1037508"
},
{
"name": "RHSA-2017:1413",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2017:1413"
},
{
"name": "RHSA-2017:1161",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2017:1161"
},
{
"name": "https://www.tenable.com/security/tns-2017-04",
"refsource": "CONFIRM",
"url": "https://www.tenable.com/security/tns-2017-04"
},
{
"name": "RHSA-2017:1414",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2017:1414"
},
{
"name": "https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbux03725en_us",
"refsource": "CONFIRM",
"url": "https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbux03725en_us"
},
{
"name": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2016-2161",
"refsource": "CONFIRM",
"url": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2016-2161"
},
{
"name": "RHSA-2017:1415",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2017-1415.html"
},
{
"name": "RHSA-2017:0906",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2017:0906"
},
{
"name": "GLSA-201701-36",
"refsource": "GENTOO",
"url": "https://security.gentoo.org/glsa/201701-36"
},
{
"name": "https://security.netapp.com/advisory/ntap-20180423-0001/",
"refsource": "CONFIRM",
"url": "https://security.netapp.com/advisory/ntap-20180423-0001/"
},
{
"name": "[httpd-cvs] 20190815 svn commit: r1048743 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
"refsource": "MLIST",
"url": "https://lists.apache.org/thread.html/56c2e7cc9deb1c12a843d0dc251ea7fd3e7e80293cde02fcd65286ba@%3Ccvs.httpd.apache.org%3E"
},
{
"name": "[httpd-cvs] 20190815 svn commit: r1048742 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
"refsource": "MLIST",
"url": "https://lists.apache.org/thread.html/84a3714f0878781f6ed84473d1a503d2cc382277e100450209231830@%3Ccvs.httpd.apache.org%3E"
},
{
"name": "[httpd-cvs] 20200401 svn commit: r1058586 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
"refsource": "MLIST",
"url": "https://lists.apache.org/thread.html/rd18c3c43602e66f9cdcf09f1de233804975b9572b0456cc582390b6f@%3Ccvs.httpd.apache.org%3E"
},
{
"name": "[httpd-cvs] 20200401 svn commit: r1058587 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
"refsource": "MLIST",
"url": "https://lists.apache.org/thread.html/re3d27b6250aa8548b8845d314bb8a350b3df326cacbbfdfe4d455234@%3Ccvs.httpd.apache.org%3E"
},
{
"name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
"refsource": "MLIST",
"url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
},
{
"name": "[httpd-cvs] 20210330 svn commit: r1073140 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
"refsource": "MLIST",
"url": "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E"
},
{
"name": "[httpd-cvs] 20210330 svn commit: r1888194 [10/13] - /httpd/site/trunk/content/security/json/",
"refsource": "MLIST",
"url": "https://lists.apache.org/thread.html/re1e3a24664d35bcd0a0e793e0b5fc6ca6c107f99a1b2c545c5d4b467@%3Ccvs.httpd.apache.org%3E"
},
{
"name": "[httpd-cvs] 20210330 svn commit: r1073139 [10/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
"refsource": "MLIST",
"url": "https://lists.apache.org/thread.html/r04e89e873d54116a0635ef2f7061c15acc5ed27ef7500997beb65d6f@%3Ccvs.httpd.apache.org%3E"
},
{
"name": "[httpd-cvs] 20210330 svn commit: r1073149 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
"refsource": "MLIST",
"url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E"
},
{
"name": "[httpd-cvs] 20210330 svn commit: r1073146 [3/3] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities-httpd.xml security/vulnerabilities_22.html security/vulnerabilities_24.html",
"refsource": "MLIST",
"url": "https://lists.apache.org/thread.html/rcc44594d4d6579b90deccd4536b5d31f099ef563df39b094be286b9e@%3Ccvs.httpd.apache.org%3E"
},
{
"name": "[httpd-cvs] 20210330 svn commit: r1073149 [10/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
"refsource": "MLIST",
"url": "https://lists.apache.org/thread.html/rb14daf9cc4e28d18cdc15d6a6ca74e565672fabf7ad89541071d008b@%3Ccvs.httpd.apache.org%3E"
},
{
"name": "[httpd-cvs] 20210603 svn commit: r1075360 [3/3] - in /websites/staging/httpd/trunk/content: ./ security/json/CVE-2021-31618.json security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
"refsource": "MLIST",
"url": "https://lists.apache.org/thread.html/rd336919f655b7ff309385e34a143e41c503e133da80414485b3abcc9@%3Ccvs.httpd.apache.org%3E"
},
{
"name": "[httpd-cvs] 20210606 svn commit: r1075470 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/json/CVE-2020-13938.json security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
"refsource": "MLIST",
"url": "https://lists.apache.org/thread.html/r76142b8c5119df2178be7c2dba88fde552eedeec37ea993dfce68d1d@%3Ccvs.httpd.apache.org%3E"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "f0158376-9dc2-43b6-827c-5f631a4d8d09",
"assignerShortName": "apache",
"cveId": "CVE-2016-2161",
"datePublished": "2017-07-27T21:00:00.000Z",
"dateReserved": "2016-01-29T00:00:00.000Z",
"dateUpdated": "2024-09-16T22:02:00.808Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"epss": {
"cve": "CVE-2016-2161",
"date": "2026-05-19",
"epss": "0.33186",
"percentile": "0.96967"
},
"fkie_nvd": {
"configurations": "[{\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:apache:http_server:2.4.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"BDC40E89-2D57-4988-913E-024BFB56B367\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:apache:http_server:2.4.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"6FCD3C8C-9BF8-4F30-981A-593EEAEB9EDD\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:apache:http_server:2.4.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"046487A3-752B-4D0F-8984-96486B828EAB\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:apache:http_server:2.4.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"89D2E052-51CD-4B57-A8B8-FAE51988D654\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:apache:http_server:2.4.6:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"8FEAB0DF-04A9-4F99-8666-0BADC5D642B8\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:apache:http_server:2.4.7:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E7D924D1-8A36-4C43-9E56-52814F9A6350\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:apache:http_server:2.4.8:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"DFA089AB-AF28-4AE1-AE39-6D1B8192A3DF\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:apache:http_server:2.4.9:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"39CDFECC-E26D-47E0-976F-6629040B3764\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:apache:http_server:2.4.10:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E3ECBCB1-0675-41F5-857B-438F36925F63\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:apache:http_server:2.4.12:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"CB6CBFBF-74F6-42AF-BC79-AA53EA75F00B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:apache:http_server:2.4.14:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"69CB1C41-0360-44D0-B73A-273B0DDE46D5\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:apache:http_server:2.4.16:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"8717A96B-9DB5-48D6-A2CF-A5E2B26AF3F3\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:apache:http_server:2.4.19:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"2AE538EE-7152-4DB5-AE45-614494CB7B95\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:apache:http_server:2.4.20:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B803D25B-0A19-4569-BA05-09D58F33917C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:apache:http_server:2.4.21:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"BE253E49-9A56-49C8-B1D8-E23BB3D5D1D7\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:apache:http_server:2.4.22:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"DE5A73E5-1A04-420B-92B2-B90FD970005C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:apache:http_server:2.4.23:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"8510442C-212F-4013-85FA-E0AB59F6F2C6\"}]}]}]",
"descriptions": "[{\"lang\": \"en\", \"value\": \"In Apache HTTP Server versions 2.4.0 to 2.4.23, malicious input to mod_auth_digest can cause the server to crash, and each instance continues to crash even for subsequently valid requests.\"}, {\"lang\": \"es\", \"value\": \"En Apache HTTP Server versiones 2.4.0 hasta 2.4.23, una entrada maliciosa a mod_auth_digest puede causar que el servidor se bloquee y cada instancia contin\\u00faa bloqueado incluso para las peticiones v\\u00e1lidas posteriormente.\"}]",
"id": "CVE-2016-2161",
"lastModified": "2024-11-21T02:47:55.963",
"metrics": "{\"cvssMetricV30\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"3.0\", \"vectorString\": \"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H\", \"baseScore\": 7.5, \"baseSeverity\": \"HIGH\", \"attackVector\": \"NETWORK\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"NONE\", \"userInteraction\": \"NONE\", \"scope\": \"UNCHANGED\", \"confidentialityImpact\": \"NONE\", \"integrityImpact\": \"NONE\", \"availabilityImpact\": \"HIGH\"}, \"exploitabilityScore\": 3.9, \"impactScore\": 3.6}], \"cvssMetricV2\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"2.0\", \"vectorString\": \"AV:N/AC:L/Au:N/C:N/I:N/A:P\", \"baseScore\": 5.0, \"accessVector\": \"NETWORK\", \"accessComplexity\": \"LOW\", \"authentication\": \"NONE\", \"confidentialityImpact\": \"NONE\", \"integrityImpact\": \"NONE\", \"availabilityImpact\": \"PARTIAL\"}, \"baseSeverity\": \"MEDIUM\", \"exploitabilityScore\": 10.0, \"impactScore\": 2.9, \"acInsufInfo\": false, \"obtainAllPrivilege\": false, \"obtainUserPrivilege\": false, \"obtainOtherPrivilege\": false, \"userInteractionRequired\": false}]}",
"published": "2017-07-27T21:29:00.257",
"references": "[{\"url\": \"http://rhn.redhat.com/errata/RHSA-2017-1415.html\", \"source\": \"security@apache.org\"}, {\"url\": \"http://www.debian.org/security/2017/dsa-3796\", \"source\": \"security@apache.org\"}, {\"url\": \"http://www.securityfocus.com/bid/95076\", \"source\": \"security@apache.org\", \"tags\": [\"Third Party Advisory\", \"VDB Entry\"]}, {\"url\": \"http://www.securitytracker.com/id/1037508\", \"source\": \"security@apache.org\", \"tags\": [\"Third Party Advisory\", \"VDB Entry\"]}, {\"url\": \"https://access.redhat.com/errata/RHSA-2017:0906\", \"source\": \"security@apache.org\"}, {\"url\": \"https://access.redhat.com/errata/RHSA-2017:1161\", \"source\": \"security@apache.org\"}, {\"url\": \"https://access.redhat.com/errata/RHSA-2017:1413\", \"source\": \"security@apache.org\"}, {\"url\": \"https://access.redhat.com/errata/RHSA-2017:1414\", \"source\": \"security@apache.org\"}, {\"url\": \"https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbux03725en_us\", \"source\": \"security@apache.org\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2016-2161\", \"source\": \"security@apache.org\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"https://lists.apache.org/thread.html/56c2e7cc9deb1c12a843d0dc251ea7fd3e7e80293cde02fcd65286ba%40%3Ccvs.httpd.apache.org%3E\", \"source\": \"security@apache.org\"}, {\"url\": \"https://lists.apache.org/thread.html/84a3714f0878781f6ed84473d1a503d2cc382277e100450209231830%40%3Ccvs.httpd.apache.org%3E\", \"source\": \"security@apache.org\"}, {\"url\": \"https://lists.apache.org/thread.html/r04e89e873d54116a0635ef2f7061c15acc5ed27ef7500997beb65d6f%40%3Ccvs.httpd.apache.org%3E\", \"source\": \"security@apache.org\"}, {\"url\": \"https://lists.apache.org/thread.html/r76142b8c5119df2178be7c2dba88fde552eedeec37ea993dfce68d1d%40%3Ccvs.httpd.apache.org%3E\", \"source\": \"security@apache.org\"}, {\"url\": \"https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E\", \"source\": \"security@apache.org\"}, {\"url\": \"https://lists.apache.org/thread.html/rb14daf9cc4e28d18cdc15d6a6ca74e565672fabf7ad89541071d008b%40%3Ccvs.httpd.apache.org%3E\", \"source\": \"security@apache.org\"}, {\"url\": \"https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a%40%3Ccvs.httpd.apache.org%3E\", \"source\": \"security@apache.org\"}, {\"url\": \"https://lists.apache.org/thread.html/rcc44594d4d6579b90deccd4536b5d31f099ef563df39b094be286b9e%40%3Ccvs.httpd.apache.org%3E\", \"source\": \"security@apache.org\"}, {\"url\": \"https://lists.apache.org/thread.html/rd18c3c43602e66f9cdcf09f1de233804975b9572b0456cc582390b6f%40%3Ccvs.httpd.apache.org%3E\", \"source\": \"security@apache.org\"}, {\"url\": \"https://lists.apache.org/thread.html/rd336919f655b7ff309385e34a143e41c503e133da80414485b3abcc9%40%3Ccvs.httpd.apache.org%3E\", \"source\": \"security@apache.org\"}, {\"url\": \"https://lists.apache.org/thread.html/re1e3a24664d35bcd0a0e793e0b5fc6ca6c107f99a1b2c545c5d4b467%40%3Ccvs.httpd.apache.org%3E\", \"source\": \"security@apache.org\"}, {\"url\": \"https://lists.apache.org/thread.html/re3d27b6250aa8548b8845d314bb8a350b3df326cacbbfdfe4d455234%40%3Ccvs.httpd.apache.org%3E\", \"source\": \"security@apache.org\"}, {\"url\": \"https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E\", \"source\": \"security@apache.org\"}, {\"url\": \"https://security.gentoo.org/glsa/201701-36\", \"source\": \"security@apache.org\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://security.netapp.com/advisory/ntap-20180423-0001/\", \"source\": \"security@apache.org\"}, {\"url\": \"https://support.apple.com/HT208221\", \"source\": \"security@apache.org\"}, {\"url\": \"https://www.tenable.com/security/tns-2017-04\", \"source\": \"security@apache.org\"}, {\"url\": \"http://rhn.redhat.com/errata/RHSA-2017-1415.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.debian.org/security/2017/dsa-3796\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.securityfocus.com/bid/95076\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\", \"VDB Entry\"]}, {\"url\": \"http://www.securitytracker.com/id/1037508\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\", \"VDB Entry\"]}, {\"url\": \"https://access.redhat.com/errata/RHSA-2017:0906\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://access.redhat.com/errata/RHSA-2017:1161\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://access.redhat.com/errata/RHSA-2017:1413\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://access.redhat.com/errata/RHSA-2017:1414\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbux03725en_us\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2016-2161\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"https://lists.apache.org/thread.html/56c2e7cc9deb1c12a843d0dc251ea7fd3e7e80293cde02fcd65286ba%40%3Ccvs.httpd.apache.org%3E\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://lists.apache.org/thread.html/84a3714f0878781f6ed84473d1a503d2cc382277e100450209231830%40%3Ccvs.httpd.apache.org%3E\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://lists.apache.org/thread.html/r04e89e873d54116a0635ef2f7061c15acc5ed27ef7500997beb65d6f%40%3Ccvs.httpd.apache.org%3E\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://lists.apache.org/thread.html/r76142b8c5119df2178be7c2dba88fde552eedeec37ea993dfce68d1d%40%3Ccvs.httpd.apache.org%3E\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://lists.apache.org/thread.html/rb14daf9cc4e28d18cdc15d6a6ca74e565672fabf7ad89541071d008b%40%3Ccvs.httpd.apache.org%3E\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a%40%3Ccvs.httpd.apache.org%3E\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://lists.apache.org/thread.html/rcc44594d4d6579b90deccd4536b5d31f099ef563df39b094be286b9e%40%3Ccvs.httpd.apache.org%3E\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://lists.apache.org/thread.html/rd18c3c43602e66f9cdcf09f1de233804975b9572b0456cc582390b6f%40%3Ccvs.httpd.apache.org%3E\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://lists.apache.org/thread.html/rd336919f655b7ff309385e34a143e41c503e133da80414485b3abcc9%40%3Ccvs.httpd.apache.org%3E\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://lists.apache.org/thread.html/re1e3a24664d35bcd0a0e793e0b5fc6ca6c107f99a1b2c545c5d4b467%40%3Ccvs.httpd.apache.org%3E\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://lists.apache.org/thread.html/re3d27b6250aa8548b8845d314bb8a350b3df326cacbbfdfe4d455234%40%3Ccvs.httpd.apache.org%3E\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://security.gentoo.org/glsa/201701-36\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://security.netapp.com/advisory/ntap-20180423-0001/\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://support.apple.com/HT208221\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://www.tenable.com/security/tns-2017-04\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}]",
"sourceIdentifier": "security@apache.org",
"vulnStatus": "Modified",
"weaknesses": "[{\"source\": \"security@apache.org\", \"type\": \"Secondary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-823\"}]}, {\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-20\"}]}]"
},
"nvd": "{\"cve\":{\"id\":\"CVE-2016-2161\",\"sourceIdentifier\":\"security@apache.org\",\"published\":\"2017-07-27T21:29:00.257\",\"lastModified\":\"2026-05-13T00:24:29.033\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"In Apache HTTP Server versions 2.4.0 to 2.4.23, malicious input to mod_auth_digest can cause the server to crash, and each instance continues to crash even for subsequently valid requests.\"},{\"lang\":\"es\",\"value\":\"En Apache HTTP Server versiones 2.4.0 hasta 2.4.23, una entrada maliciosa a mod_auth_digest puede causar que el servidor se bloquee y cada instancia contin\u00faa bloqueado incluso para las peticiones v\u00e1lidas posteriormente.\"}],\"metrics\":{\"cvssMetricV30\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.0\",\"vectorString\":\"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H\",\"baseScore\":7.5,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":3.9,\"impactScore\":3.6}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:N/C:N/I:N/A:P\",\"baseScore\":5.0,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"PARTIAL\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":10.0,\"impactScore\":2.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"security@apache.org\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-823\"}]},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-20\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:http_server:2.4.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BDC40E89-2D57-4988-913E-024BFB56B367\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:http_server:2.4.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6FCD3C8C-9BF8-4F30-981A-593EEAEB9EDD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:http_server:2.4.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"046487A3-752B-4D0F-8984-96486B828EAB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:http_server:2.4.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"89D2E052-51CD-4B57-A8B8-FAE51988D654\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:http_server:2.4.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8FEAB0DF-04A9-4F99-8666-0BADC5D642B8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:http_server:2.4.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E7D924D1-8A36-4C43-9E56-52814F9A6350\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:http_server:2.4.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DFA089AB-AF28-4AE1-AE39-6D1B8192A3DF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:http_server:2.4.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"39CDFECC-E26D-47E0-976F-6629040B3764\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:http_server:2.4.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E3ECBCB1-0675-41F5-857B-438F36925F63\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:http_server:2.4.12:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CB6CBFBF-74F6-42AF-BC79-AA53EA75F00B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:http_server:2.4.14:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"69CB1C41-0360-44D0-B73A-273B0DDE46D5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:http_server:2.4.16:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8717A96B-9DB5-48D6-A2CF-A5E2B26AF3F3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:http_server:2.4.19:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2AE538EE-7152-4DB5-AE45-614494CB7B95\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:http_server:2.4.20:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B803D25B-0A19-4569-BA05-09D58F33917C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:http_server:2.4.21:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BE253E49-9A56-49C8-B1D8-E23BB3D5D1D7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:http_server:2.4.22:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DE5A73E5-1A04-420B-92B2-B90FD970005C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:http_server:2.4.23:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8510442C-212F-4013-85FA-E0AB59F6F2C6\"}]}]}],\"references\":[{\"url\":\"http://rhn.redhat.com/errata/RHSA-2017-1415.html\",\"source\":\"security@apache.org\"},{\"url\":\"http://www.debian.org/security/2017/dsa-3796\",\"source\":\"security@apache.org\"},{\"url\":\"http://www.securityfocus.com/bid/95076\",\"source\":\"security@apache.org\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.securitytracker.com/id/1037508\",\"source\":\"security@apache.org\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2017:0906\",\"source\":\"security@apache.org\"},{\"url\":\"https://access.redhat.com/errata/RHSA-2017:1161\",\"source\":\"security@apache.org\"},{\"url\":\"https://access.redhat.com/errata/RHSA-2017:1413\",\"source\":\"security@apache.org\"},{\"url\":\"https://access.redhat.com/errata/RHSA-2017:1414\",\"source\":\"security@apache.org\"},{\"url\":\"https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbux03725en_us\",\"source\":\"security@apache.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2016-2161\",\"source\":\"security@apache.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://lists.apache.org/thread.html/56c2e7cc9deb1c12a843d0dc251ea7fd3e7e80293cde02fcd65286ba%40%3Ccvs.httpd.apache.org%3E\",\"source\":\"security@apache.org\"},{\"url\":\"https://lists.apache.org/thread.html/84a3714f0878781f6ed84473d1a503d2cc382277e100450209231830%40%3Ccvs.httpd.apache.org%3E\",\"source\":\"security@apache.org\"},{\"url\":\"https://lists.apache.org/thread.html/r04e89e873d54116a0635ef2f7061c15acc5ed27ef7500997beb65d6f%40%3Ccvs.httpd.apache.org%3E\",\"source\":\"security@apache.org\"},{\"url\":\"https://lists.apache.org/thread.html/r76142b8c5119df2178be7c2dba88fde552eedeec37ea993dfce68d1d%40%3Ccvs.httpd.apache.org%3E\",\"source\":\"security@apache.org\"},{\"url\":\"https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E\",\"source\":\"security@apache.org\"},{\"url\":\"https://lists.apache.org/thread.html/rb14daf9cc4e28d18cdc15d6a6ca74e565672fabf7ad89541071d008b%40%3Ccvs.httpd.apache.org%3E\",\"source\":\"security@apache.org\"},{\"url\":\"https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a%40%3Ccvs.httpd.apache.org%3E\",\"source\":\"security@apache.org\"},{\"url\":\"https://lists.apache.org/thread.html/rcc44594d4d6579b90deccd4536b5d31f099ef563df39b094be286b9e%40%3Ccvs.httpd.apache.org%3E\",\"source\":\"security@apache.org\"},{\"url\":\"https://lists.apache.org/thread.html/rd18c3c43602e66f9cdcf09f1de233804975b9572b0456cc582390b6f%40%3Ccvs.httpd.apache.org%3E\",\"source\":\"security@apache.org\"},{\"url\":\"https://lists.apache.org/thread.html/rd336919f655b7ff309385e34a143e41c503e133da80414485b3abcc9%40%3Ccvs.httpd.apache.org%3E\",\"source\":\"security@apache.org\"},{\"url\":\"https://lists.apache.org/thread.html/re1e3a24664d35bcd0a0e793e0b5fc6ca6c107f99a1b2c545c5d4b467%40%3Ccvs.httpd.apache.org%3E\",\"source\":\"security@apache.org\"},{\"url\":\"https://lists.apache.org/thread.html/re3d27b6250aa8548b8845d314bb8a350b3df326cacbbfdfe4d455234%40%3Ccvs.httpd.apache.org%3E\",\"source\":\"security@apache.org\"},{\"url\":\"https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E\",\"source\":\"security@apache.org\"},{\"url\":\"https://security.gentoo.org/glsa/201701-36\",\"source\":\"security@apache.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://security.netapp.com/advisory/ntap-20180423-0001/\",\"source\":\"security@apache.org\"},{\"url\":\"https://support.apple.com/HT208221\",\"source\":\"security@apache.org\"},{\"url\":\"https://www.tenable.com/security/tns-2017-04\",\"source\":\"security@apache.org\"},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2017-1415.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.debian.org/security/2017/dsa-3796\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securityfocus.com/bid/95076\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.securitytracker.com/id/1037508\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2017:0906\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://access.redhat.com/errata/RHSA-2017:1161\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://access.redhat.com/errata/RHSA-2017:1413\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://access.redhat.com/errata/RHSA-2017:1414\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbux03725en_us\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2016-2161\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://lists.apache.org/thread.html/56c2e7cc9deb1c12a843d0dc251ea7fd3e7e80293cde02fcd65286ba%40%3Ccvs.httpd.apache.org%3E\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://lists.apache.org/thread.html/84a3714f0878781f6ed84473d1a503d2cc382277e100450209231830%40%3Ccvs.httpd.apache.org%3E\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://lists.apache.org/thread.html/r04e89e873d54116a0635ef2f7061c15acc5ed27ef7500997beb65d6f%40%3Ccvs.httpd.apache.org%3E\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://lists.apache.org/thread.html/r76142b8c5119df2178be7c2dba88fde552eedeec37ea993dfce68d1d%40%3Ccvs.httpd.apache.org%3E\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://lists.apache.org/thread.html/rb14daf9cc4e28d18cdc15d6a6ca74e565672fabf7ad89541071d008b%40%3Ccvs.httpd.apache.org%3E\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a%40%3Ccvs.httpd.apache.org%3E\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://lists.apache.org/thread.html/rcc44594d4d6579b90deccd4536b5d31f099ef563df39b094be286b9e%40%3Ccvs.httpd.apache.org%3E\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://lists.apache.org/thread.html/rd18c3c43602e66f9cdcf09f1de233804975b9572b0456cc582390b6f%40%3Ccvs.httpd.apache.org%3E\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://lists.apache.org/thread.html/rd336919f655b7ff309385e34a143e41c503e133da80414485b3abcc9%40%3Ccvs.httpd.apache.org%3E\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://lists.apache.org/thread.html/re1e3a24664d35bcd0a0e793e0b5fc6ca6c107f99a1b2c545c5d4b467%40%3Ccvs.httpd.apache.org%3E\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://lists.apache.org/thread.html/re3d27b6250aa8548b8845d314bb8a350b3df326cacbbfdfe4d455234%40%3Ccvs.httpd.apache.org%3E\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://security.gentoo.org/glsa/201701-36\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://security.netapp.com/advisory/ntap-20180423-0001/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://support.apple.com/HT208221\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://www.tenable.com/security/tns-2017-04\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}]}}"
}
}
CERTFR-2017-AVI-092
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été corrigées dans les produits Apple. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire, un déni de service à distance et un déni de service.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| Apple | N/A | watchOS versions antérieures à 3.2 | ||
| Apple | N/A | iOS versions antérieures à 10.3 | ||
| Apple | N/A | Pages versions antérieures à 3.1, Numbers versions antérieures à 3.1 et Keynote versions antérieures à 3.1 pour iOS | ||
| Apple | macOS | macOS Yosemite sans le Security Update 2017-001 | ||
| Apple | macOS | macOS Server versions antérieures à 5.3 | ||
| Apple | macOS | macOS Sierra versions antérieures à 10.12.4 | ||
| Apple | macOS | macOS El Capitan sans le Security Update 2017-001 | ||
| Apple | N/A | tvOS versions antérieures à 10.2 | ||
| Apple | N/A | iCloud pour Windows versions antérieures à 6.2 | ||
| Apple | Safari | Safari versions antérieures à 10.1 | ||
| Apple | N/A | Pages versions antérieures à 6.1, Numbers versions antérieures à 4.1 et Keynote versions antérieures à 7.1 pour Mac |
| Title | Publication Time | Tags | ||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "watchOS versions ant\u00e9rieures \u00e0 3.2",
"product": {
"name": "N/A",
"vendor": {
"name": "Apple",
"scada": false
}
}
},
{
"description": "iOS versions ant\u00e9rieures \u00e0 10.3",
"product": {
"name": "N/A",
"vendor": {
"name": "Apple",
"scada": false
}
}
},
{
"description": "Pages versions ant\u00e9rieures \u00e0 3.1, Numbers versions ant\u00e9rieures \u00e0 3.1 et Keynote versions ant\u00e9rieures \u00e0 3.1 pour iOS",
"product": {
"name": "N/A",
"vendor": {
"name": "Apple",
"scada": false
}
}
},
{
"description": "macOS Yosemite sans le Security Update 2017-001",
"product": {
"name": "macOS",
"vendor": {
"name": "Apple",
"scada": false
}
}
},
{
"description": "macOS Server versions ant\u00e9rieures \u00e0 5.3",
"product": {
"name": "macOS",
"vendor": {
"name": "Apple",
"scada": false
}
}
},
{
"description": "macOS Sierra versions ant\u00e9rieures \u00e0 10.12.4",
"product": {
"name": "macOS",
"vendor": {
"name": "Apple",
"scada": false
}
}
},
{
"description": "macOS El Capitan sans le Security Update 2017-001",
"product": {
"name": "macOS",
"vendor": {
"name": "Apple",
"scada": false
}
}
},
{
"description": "tvOS versions ant\u00e9rieures \u00e0 10.2",
"product": {
"name": "N/A",
"vendor": {
"name": "Apple",
"scada": false
}
}
},
{
"description": "iCloud pour Windows versions ant\u00e9rieures \u00e0 6.2",
"product": {
"name": "N/A",
"vendor": {
"name": "Apple",
"scada": false
}
}
},
{
"description": "Safari versions ant\u00e9rieures \u00e0 10.1",
"product": {
"name": "Safari",
"vendor": {
"name": "Apple",
"scada": false
}
}
},
{
"description": "Pages versions ant\u00e9rieures \u00e0 6.1, Numbers versions ant\u00e9rieures \u00e0 4.1 et Keynote versions ant\u00e9rieures \u00e0 7.1 pour Mac",
"product": {
"name": "N/A",
"vendor": {
"name": "Apple",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2017-2455",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2455"
},
{
"name": "CVE-2016-7922",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-7922"
},
{
"name": "CVE-2016-7936",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-7936"
},
{
"name": "CVE-2017-2464",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2464"
},
{
"name": "CVE-2017-2397",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2397"
},
{
"name": "CVE-2017-2414",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2414"
},
{
"name": "CVE-2017-2404",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2404"
},
{
"name": "CVE-2017-2376",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2376"
},
{
"name": "CVE-2017-6974",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-6974"
},
{
"name": "CVE-2017-5203",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5203"
},
{
"name": "CVE-2016-7933",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-7933"
},
{
"name": "CVE-2016-0736",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-0736"
},
{
"name": "CVE-2017-5204",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5204"
},
{
"name": "CVE-2017-2400",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2400"
},
{
"name": "CVE-2017-5484",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5484"
},
{
"name": "CVE-2017-2413",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2413"
},
{
"name": "CVE-2017-2391",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2391"
},
{
"name": "CVE-2017-2420",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2420"
},
{
"name": "CVE-2017-2446",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2446"
},
{
"name": "CVE-2016-7993",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-7993"
},
{
"name": "CVE-2016-7932",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-7932"
},
{
"name": "CVE-2017-2431",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2431"
},
{
"name": "CVE-2017-2367",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2367"
},
{
"name": "CVE-2016-7973",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-7973"
},
{
"name": "CVE-2016-8575",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-8575"
},
{
"name": "CVE-2017-2418",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2418"
},
{
"name": "CVE-2017-2412",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2412"
},
{
"name": "CVE-2017-2426",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2426"
},
{
"name": "CVE-2017-2448",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2448"
},
{
"name": "CVE-2017-2462",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2462"
},
{
"name": "CVE-2016-9540",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-9540"
},
{
"name": "CVE-2017-2452",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2452"
},
{
"name": "CVE-2017-2437",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2437"
},
{
"name": "CVE-2017-2423",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2423"
},
{
"name": "CVE-2017-2472",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2472"
},
{
"name": "CVE-2016-9643",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-9643"
},
{
"name": "CVE-2016-1001",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1001"
},
{
"name": "CVE-2016-8574",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-8574"
},
{
"name": "CVE-2017-2453",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2453"
},
{
"name": "CVE-2017-2487",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2487"
},
{
"name": "CVE-2017-5029",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5029"
},
{
"name": "CVE-2017-2396",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2396"
},
{
"name": "CVE-2017-2475",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2475"
},
{
"name": "CVE-2017-2481",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2481"
},
{
"name": "CVE-2017-5483",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5483"
},
{
"name": "CVE-2017-2440",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2440"
},
{
"name": "CVE-2017-2479",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2479"
},
{
"name": "CVE-2017-2468",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2468"
},
{
"name": "CVE-2017-2388",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2388"
},
{
"name": "CVE-2016-1015",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1015"
},
{
"name": "CVE-2017-2458",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2458"
},
{
"name": "CVE-2017-2471",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2471"
},
{
"name": "CVE-2016-7975",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-7975"
},
{
"name": "CVE-2016-7986",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-7986"
},
{
"name": "CVE-2017-2406",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2406"
},
{
"name": "CVE-2017-5485",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5485"
},
{
"name": "CVE-2017-2441",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2441"
},
{
"name": "CVE-2016-5636",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-5636"
},
{
"name": "CVE-2017-2443",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2443"
},
{
"name": "CVE-2016-8740",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-8740"
},
{
"name": "CVE-2016-7934",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-7934"
},
{
"name": "CVE-2017-2463",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2463"
},
{
"name": "CVE-2017-2392",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2392"
},
{
"name": "CVE-2016-9533",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-9533"
},
{
"name": "CVE-2017-2428",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2428"
},
{
"name": "CVE-2016-7928",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-7928"
},
{
"name": "CVE-2017-2439",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2439"
},
{
"name": "CVE-2017-2408",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2408"
},
{
"name": "CVE-2017-2390",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2390"
},
{
"name": "CVE-2016-0751",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-0751"
},
{
"name": "CVE-2017-2449",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2449"
},
{
"name": "CVE-2016-7927",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-7927"
},
{
"name": "CVE-2017-2383",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2383"
},
{
"name": "CVE-2017-2483",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2483"
},
{
"name": "CVE-2007-6750",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-6750"
},
{
"name": "CVE-2016-2161",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-2161"
},
{
"name": "CVE-2016-9536",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-9536"
},
{
"name": "CVE-2017-2486",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2486"
},
{
"name": "CVE-2017-2465",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2465"
},
{
"name": "CVE-2017-2422",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2422"
},
{
"name": "CVE-2016-7974",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-7974"
},
{
"name": "CVE-2017-2425",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2425"
},
{
"name": "CVE-2017-5341",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5341"
},
{
"name": "CVE-2017-2399",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2399"
},
{
"name": "CVE-2017-2389",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2389"
},
{
"name": "CVE-2017-2485",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2485"
},
{
"name": "CVE-2016-7935",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-7935"
},
{
"name": "CVE-2017-2478",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2478"
},
{
"name": "CVE-2017-2467",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2467"
},
{
"name": "CVE-2016-5387",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-5387"
},
{
"name": "CVE-2017-2435",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2435"
},
{
"name": "CVE-2016-9537",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-9537"
},
{
"name": "CVE-2017-2407",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2407"
},
{
"name": "CVE-2017-2385",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2385"
},
{
"name": "CVE-2017-2424",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2424"
},
{
"name": "CVE-2017-2436",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2436"
},
{
"name": "CVE-2017-2454",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2454"
},
{
"name": "CVE-2016-7984",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-7984"
},
{
"name": "CVE-2016-7585",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-7585"
},
{
"name": "CVE-2016-9935",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-9935"
},
{
"name": "CVE-2016-7931",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-7931"
},
{
"name": "CVE-2017-2378",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2378"
},
{
"name": "CVE-2016-7939",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-7939"
},
{
"name": "CVE-2017-2377",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2377"
},
{
"name": "CVE-2017-2402",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2402"
},
{
"name": "CVE-2017-2427",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2427"
},
{
"name": "CVE-2017-2473",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2473"
},
{
"name": "CVE-2017-2398",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2398"
},
{
"name": "CVE-2017-2469",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2469"
},
{
"name": "CVE-2016-3619",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-3619"
},
{
"name": "CVE-2017-2459",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2459"
},
{
"name": "CVE-2017-2386",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2386"
},
{
"name": "CVE-2017-2401",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2401"
},
{
"name": "CVE-2016-7923",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-7923"
},
{
"name": "CVE-2017-2419",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2419"
},
{
"name": "CVE-2017-2474",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2474"
},
{
"name": "CVE-2016-7985",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-7985"
},
{
"name": "CVE-2016-9539",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-9539"
},
{
"name": "CVE-2017-2409",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2409"
},
{
"name": "CVE-2016-7992",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-7992"
},
{
"name": "CVE-2017-2380",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2380"
},
{
"name": "CVE-2017-2484",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2484"
},
{
"name": "CVE-2017-2466",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2466"
},
{
"name": "CVE-2017-2393",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2393"
},
{
"name": "CVE-2017-2395",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2395"
},
{
"name": "CVE-2017-2445",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2445"
},
{
"name": "CVE-2016-7929",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-7929"
},
{
"name": "CVE-2017-2442",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2442"
},
{
"name": "CVE-2017-2416",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2416"
},
{
"name": "CVE-2017-2444",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2444"
},
{
"name": "CVE-2017-2364",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2364"
},
{
"name": "CVE-2017-5342",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5342"
},
{
"name": "CVE-2017-2415",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2415"
},
{
"name": "CVE-2017-2379",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2379"
},
{
"name": "CVE-2017-2457",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2457"
},
{
"name": "CVE-2017-2434",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2434"
},
{
"name": "CVE-2017-2382",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2382"
},
{
"name": "CVE-2017-2381",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2381"
},
{
"name": "CVE-2017-2410",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2410"
},
{
"name": "CVE-2016-9586",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-9586"
},
{
"name": "CVE-2017-2421",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2421"
},
{
"name": "CVE-2017-5205",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5205"
},
{
"name": "CVE-2016-7940",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-7940"
},
{
"name": "CVE-2017-2438",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2438"
},
{
"name": "CVE-2017-2460",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2460"
},
{
"name": "CVE-2017-5482",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5482"
},
{
"name": "CVE-2016-7926",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-7926"
},
{
"name": "CVE-2017-2403",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2403"
},
{
"name": "CVE-2017-2461",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2461"
},
{
"name": "CVE-2017-2384",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2384"
},
{
"name": "CVE-2017-5486",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5486"
},
{
"name": "CVE-2016-7937",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-7937"
},
{
"name": "CVE-2016-7983",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-7983"
},
{
"name": "CVE-2016-1016",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1016"
},
{
"name": "CVE-2016-9642",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-9642"
},
{
"name": "CVE-2016-7925",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-7925"
},
{
"name": "CVE-2017-2405",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2405"
},
{
"name": "CVE-2017-2417",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2417"
},
{
"name": "CVE-2017-2447",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2447"
},
{
"name": "CVE-2017-2482",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2482"
},
{
"name": "CVE-2017-2451",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2451"
},
{
"name": "CVE-2017-2430",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2430"
},
{
"name": "CVE-2016-7930",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-7930"
},
{
"name": "CVE-2017-2456",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2456"
},
{
"name": "CVE-2016-7056",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-7056"
},
{
"name": "CVE-2017-2432",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2432"
},
{
"name": "CVE-2016-8743",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-8743"
},
{
"name": "CVE-2017-2470",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2470"
},
{
"name": "CVE-2016-9538",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-9538"
},
{
"name": "CVE-2017-2476",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2476"
},
{
"name": "CVE-2016-7938",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-7938"
},
{
"name": "CVE-2017-5202",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5202"
},
{
"name": "CVE-2016-1000",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1000"
},
{
"name": "CVE-2017-2433",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2433"
},
{
"name": "CVE-2017-2450",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2450"
},
{
"name": "CVE-2017-2480",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2480"
},
{
"name": "CVE-2016-9535",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-9535"
},
{
"name": "CVE-2016-7924",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-7924"
},
{
"name": "CVE-2017-2429",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2429"
},
{
"name": "CVE-2017-2394",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2394"
}
],
"links": [],
"reference": "CERTFR-2017-AVI-092",
"revisions": [
{
"description": "version initiale.",
"revision_date": "2017-03-28T00:00:00.000000"
},
{
"description": "ajout des informations li\u00e9es au bulletin de s\u00e9curit\u00e9 HT207607.",
"revision_date": "2017-03-29T00:00:00.000000"
}
],
"risks": [
{
"description": "Injection de code indirecte \u00e0 distance"
},
{
"description": "Ex\u00e9cution de code arbitraire"
},
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "D\u00e9ni de service"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 corrig\u00e9es dans \u003cspan\nclass=\"textit\"\u003eles produits Apple\u003c/span\u003e. Certaines d\u0027entre elles\npermettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire,\nun d\u00e9ni de service \u00e0 distance et un d\u00e9ni de service.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Apple",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Apple HT207604 du 27 mars 2017",
"url": "https://support.apple.com/en-us/HT207604"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Apple HT207607 du 28 mars 2017",
"url": "https://support.apple.com/en-us/HT207607"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Apple HT207615 du 27 mars 2017",
"url": "https://support.apple.com/en-us/HT207615"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Apple HT207602 du 27 mars 2017",
"url": "https://support.apple.com/en-us/HT207602"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Apple HT207600 du 27 mars 2017",
"url": "https://support.apple.com/en-us/HT207600"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Apple HT207595 du 27 mars 2017",
"url": "https://support.apple.com/en-us/HT207595"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Apple HT207601 du 27 mars 2017",
"url": "https://support.apple.com/en-us/HT207601"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Apple HT207617 du 27 mars 2017",
"url": "https://support.apple.com/en-us/HT207617"
}
]
}
CERTFR-2017-AVI-385
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans les produits Apple . Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, un déni de service à distance et un contournement de la politique de sécurité.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| Apple | N/A | iOS versions antérieures à 11.1 | ||
| Apple | N/A | watchOS versions antérieures à 4.1 | ||
| Apple | macOS | macOS Sierra versions sans le correctif de sécurité 2017-001 | ||
| Apple | N/A | tvOS versions antérieures à 11.1 | ||
| Apple | macOS | macOS El Capitan sans le correctif de sécurité 2017-004 | ||
| Apple | N/A | iTunes versions antérieures à 12.7.1 sur Windows | ||
| Apple | N/A | iCloud pour Windows versions antérieures à 7.1 | ||
| Apple | Safari | Safari versions antérieures à 11.0.1 | ||
| Apple | macOS | macOS High Sierra versions antérieures à 10.13.1 |
| Title | Publication Time | Tags | |||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "iOS versions ant\u00e9rieures \u00e0 11.1",
"product": {
"name": "N/A",
"vendor": {
"name": "Apple",
"scada": false
}
}
},
{
"description": "watchOS versions ant\u00e9rieures \u00e0 4.1",
"product": {
"name": "N/A",
"vendor": {
"name": "Apple",
"scada": false
}
}
},
{
"description": "macOS Sierra versions sans le correctif de s\u00e9curit\u00e9 2017-001",
"product": {
"name": "macOS",
"vendor": {
"name": "Apple",
"scada": false
}
}
},
{
"description": "tvOS versions ant\u00e9rieures \u00e0 11.1",
"product": {
"name": "N/A",
"vendor": {
"name": "Apple",
"scada": false
}
}
},
{
"description": "macOS El Capitan sans le correctif de s\u00e9curit\u00e9 2017-004",
"product": {
"name": "macOS",
"vendor": {
"name": "Apple",
"scada": false
}
}
},
{
"description": "iTunes versions ant\u00e9rieures \u00e0 12.7.1 sur Windows",
"product": {
"name": "N/A",
"vendor": {
"name": "Apple",
"scada": false
}
}
},
{
"description": "iCloud pour Windows versions ant\u00e9rieures \u00e0 7.1",
"product": {
"name": "N/A",
"vendor": {
"name": "Apple",
"scada": false
}
}
},
{
"description": "Safari versions ant\u00e9rieures \u00e0 11.0.1",
"product": {
"name": "Safari",
"vendor": {
"name": "Apple",
"scada": false
}
}
},
{
"description": "macOS High Sierra versions ant\u00e9rieures \u00e0 10.13.1",
"product": {
"name": "macOS",
"vendor": {
"name": "Apple",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2017-13802",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13802"
},
{
"name": "CVE-2017-13818",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13818"
},
{
"name": "CVE-2017-13052",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13052"
},
{
"name": "CVE-2017-12993",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-12993"
},
{
"name": "CVE-2017-13018",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13018"
},
{
"name": "CVE-2017-13043",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13043"
},
{
"name": "CVE-2017-3169",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3169"
},
{
"name": "CVE-2017-9789",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-9789"
},
{
"name": "CVE-2017-7659",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7659"
},
{
"name": "CVE-2016-4736",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-4736"
},
{
"name": "CVE-2017-13050",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13050"
},
{
"name": "CVE-2017-13816",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13816"
},
{
"name": "CVE-2017-13798",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13798"
},
{
"name": "CVE-2017-11108",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-11108"
},
{
"name": "CVE-2017-13017",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13017"
},
{
"name": "CVE-2017-13831",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13831"
},
{
"name": "CVE-2017-11543",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-11543"
},
{
"name": "CVE-2017-13790",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13790"
},
{
"name": "CVE-2017-13000",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13000"
},
{
"name": "CVE-2017-13807",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13807"
},
{
"name": "CVE-2017-13843",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13843"
},
{
"name": "CVE-2017-13055",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13055"
},
{
"name": "CVE-2017-7668",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7668"
},
{
"name": "CVE-2017-13041",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13041"
},
{
"name": "CVE-2017-12902",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-12902"
},
{
"name": "CVE-2017-13834",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13834"
},
{
"name": "CVE-2017-13007",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13007"
},
{
"name": "CVE-2017-13687",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13687"
},
{
"name": "CVE-2017-13078",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13078"
},
{
"name": "CVE-2017-12986",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-12986"
},
{
"name": "CVE-2017-13821",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13821"
},
{
"name": "CVE-2017-13033",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13033"
},
{
"name": "CVE-2017-13817",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13817"
},
{
"name": "CVE-2017-13799",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13799"
},
{
"name": "CVE-2017-12901",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-12901"
},
{
"name": "CVE-2017-13832",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13832"
},
{
"name": "CVE-2017-13011",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13011"
},
{
"name": "CVE-2017-13046",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13046"
},
{
"name": "CVE-2017-13840",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13840"
},
{
"name": "CVE-2017-12897",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-12897"
},
{
"name": "CVE-2017-13809",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13809"
},
{
"name": "CVE-2017-13822",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13822"
},
{
"name": "CVE-2017-7113",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7113"
},
{
"name": "CVE-2017-13800",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13800"
},
{
"name": "CVE-2017-13786",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13786"
},
{
"name": "CVE-2017-13003",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13003"
},
{
"name": "CVE-2017-13815",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13815"
},
{
"name": "CVE-2017-13013",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13013"
},
{
"name": "CVE-2017-13001",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13001"
},
{
"name": "CVE-2017-13009",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13009"
},
{
"name": "CVE-2017-1000101",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-1000101"
},
{
"name": "CVE-2016-8740",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-8740"
},
{
"name": "CVE-2017-13048",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13048"
},
{
"name": "CVE-2017-13054",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13054"
},
{
"name": "CVE-2017-13038",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13038"
},
{
"name": "CVE-2017-13841",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13841"
},
{
"name": "CVE-2017-13010",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13010"
},
{
"name": "CVE-2017-12990",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-12990"
},
{
"name": "CVE-2017-13783",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13783"
},
{
"name": "CVE-2017-13047",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13047"
},
{
"name": "CVE-2017-12991",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-12991"
},
{
"name": "CVE-2017-13805",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13805"
},
{
"name": "CVE-2017-13811",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13811"
},
{
"name": "CVE-2017-13849",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13849"
},
{
"name": "CVE-2017-13032",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13032"
},
{
"name": "CVE-2017-13801",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13801"
},
{
"name": "CVE-2017-13051",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13051"
},
{
"name": "CVE-2017-13036",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13036"
},
{
"name": "CVE-2017-9788",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-9788"
},
{
"name": "CVE-2017-13844",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13844"
},
{
"name": "CVE-2016-2161",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-2161"
},
{
"name": "CVE-2017-13795",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13795"
},
{
"name": "CVE-2017-13690",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13690"
},
{
"name": "CVE-2017-13838",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13838"
},
{
"name": "CVE-2017-11542",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-11542"
},
{
"name": "CVE-2017-13842",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13842"
},
{
"name": "CVE-2017-12997",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-12997"
},
{
"name": "CVE-2017-13045",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13045"
},
{
"name": "CVE-2017-13026",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13026"
},
{
"name": "CVE-2017-13785",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13785"
},
{
"name": "CVE-2016-5387",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-5387"
},
{
"name": "CVE-2017-13796",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13796"
},
{
"name": "CVE-2017-13782",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13782"
},
{
"name": "CVE-2017-13784",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13784"
},
{
"name": "CVE-2017-13042",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13042"
},
{
"name": "CVE-2017-12992",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-12992"
},
{
"name": "CVE-2017-13027",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13027"
},
{
"name": "CVE-2017-13034",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13034"
},
{
"name": "CVE-2017-13794",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13794"
},
{
"name": "CVE-2017-13015",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13015"
},
{
"name": "CVE-2017-13725",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13725"
},
{
"name": "CVE-2017-13819",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13819"
},
{
"name": "CVE-2017-13044",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13044"
},
{
"name": "CVE-2017-12900",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-12900"
},
{
"name": "CVE-2017-12994",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-12994"
},
{
"name": "CVE-2017-12998",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-12998"
},
{
"name": "CVE-2017-13029",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13029"
},
{
"name": "CVE-2017-13037",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13037"
},
{
"name": "CVE-2017-13788",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13788"
},
{
"name": "CVE-2017-7132",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7132"
},
{
"name": "CVE-2017-13810",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13810"
},
{
"name": "CVE-2017-13039",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13039"
},
{
"name": "CVE-2017-13791",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13791"
},
{
"name": "CVE-2017-13023",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13023"
},
{
"name": "CVE-2017-13020",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13020"
},
{
"name": "CVE-2017-13021",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13021"
},
{
"name": "CVE-2017-3167",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3167"
},
{
"name": "CVE-2017-12896",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-12896"
},
{
"name": "CVE-2017-13824",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13824"
},
{
"name": "CVE-2017-13049",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13049"
},
{
"name": "CVE-2017-12999",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-12999"
},
{
"name": "CVE-2017-13836",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13836"
},
{
"name": "CVE-2017-13823",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13823"
},
{
"name": "CVE-2017-13846",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13846"
},
{
"name": "CVE-2017-12988",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-12988"
},
{
"name": "CVE-2017-13789",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13789"
},
{
"name": "CVE-2017-12985",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-12985"
},
{
"name": "CVE-2017-12899",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-12899"
},
{
"name": "CVE-2017-7679",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7679"
},
{
"name": "CVE-2017-13014",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13014"
},
{
"name": "CVE-2017-12894",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-12894"
},
{
"name": "CVE-2017-13804",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13804"
},
{
"name": "CVE-2017-13024",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13024"
},
{
"name": "CVE-2017-13004",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13004"
},
{
"name": "CVE-2017-12996",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-12996"
},
{
"name": "CVE-2017-13830",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13830"
},
{
"name": "CVE-2017-12893",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-12893"
},
{
"name": "CVE-2017-13019",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13019"
},
{
"name": "CVE-2017-13030",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13030"
},
{
"name": "CVE-2017-13808",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13808"
},
{
"name": "CVE-2017-13813",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13813"
},
{
"name": "CVE-2017-1000100",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-1000100"
},
{
"name": "CVE-2017-13053",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13053"
},
{
"name": "CVE-2017-13040",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13040"
},
{
"name": "CVE-2017-13689",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13689"
},
{
"name": "CVE-2017-11103",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-11103"
},
{
"name": "CVE-2017-13005",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13005"
},
{
"name": "CVE-2017-13793",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13793"
},
{
"name": "CVE-2017-13814",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13814"
},
{
"name": "CVE-2017-12987",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-12987"
},
{
"name": "CVE-2017-13826",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13826"
},
{
"name": "CVE-2017-11541",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-11541"
},
{
"name": "CVE-2017-13025",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13025"
},
{
"name": "CVE-2017-13828",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13828"
},
{
"name": "CVE-2017-13688",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13688"
},
{
"name": "CVE-2017-13820",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13820"
},
{
"name": "CVE-2017-12995",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-12995"
},
{
"name": "CVE-2017-13792",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13792"
},
{
"name": "CVE-2017-13031",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13031"
},
{
"name": "CVE-2017-13028",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13028"
},
{
"name": "CVE-2017-13825",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13825"
},
{
"name": "CVE-2016-8743",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-8743"
},
{
"name": "CVE-2017-13803",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13803"
},
{
"name": "CVE-2017-13006",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13006"
},
{
"name": "CVE-2017-12895",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-12895"
},
{
"name": "CVE-2017-13812",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13812"
},
{
"name": "CVE-2017-13022",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13022"
},
{
"name": "CVE-2017-13012",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13012"
},
{
"name": "CVE-2017-13002",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13002"
},
{
"name": "CVE-2017-13035",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13035"
},
{
"name": "CVE-2017-12989",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-12989"
},
{
"name": "CVE-2017-13077",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13077"
},
{
"name": "CVE-2017-13016",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13016"
},
{
"name": "CVE-2017-13080",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13080"
},
{
"name": "CVE-2017-12898",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-12898"
},
{
"name": "CVE-2017-13008",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13008"
}
],
"links": [],
"reference": "CERTFR-2017-AVI-385",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2017-11-02T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits Apple\n. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une\nex\u00e9cution de code arbitraire \u00e0 distance, un d\u00e9ni de service \u00e0 distance\net un contournement de la politique de s\u00e9curit\u00e9.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Apple",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Apple HT208225 du 31 octobre 2017",
"url": "https://support.apple.com/en-us/HT208225"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Apple HT208222 du 31 octobre 2017",
"url": "https://support.apple.com/en-us/HT208222"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Apple HT208219 du 31 octobre 2017",
"url": "https://support.apple.com/en-us/HT208219"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Apple HT208223 du 31 octobre 2017",
"url": "https://support.apple.com/en-us/HT208223"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Apple HT208220 du 31 octobre 2017",
"url": "https://support.apple.com/en-us/HT208220"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Apple HT208221 du 31 octobre 2017",
"url": "https://support.apple.com/en-us/HT208221"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Apple HT208224 du 31 octobre 2017",
"url": "https://support.apple.com/en-us/HT208224"
}
]
}
CERTFR-2017-AVI-092
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été corrigées dans les produits Apple. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire, un déni de service à distance et un déni de service.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| Apple | N/A | watchOS versions antérieures à 3.2 | ||
| Apple | N/A | iOS versions antérieures à 10.3 | ||
| Apple | N/A | Pages versions antérieures à 3.1, Numbers versions antérieures à 3.1 et Keynote versions antérieures à 3.1 pour iOS | ||
| Apple | macOS | macOS Yosemite sans le Security Update 2017-001 | ||
| Apple | macOS | macOS Server versions antérieures à 5.3 | ||
| Apple | macOS | macOS Sierra versions antérieures à 10.12.4 | ||
| Apple | macOS | macOS El Capitan sans le Security Update 2017-001 | ||
| Apple | N/A | tvOS versions antérieures à 10.2 | ||
| Apple | N/A | iCloud pour Windows versions antérieures à 6.2 | ||
| Apple | Safari | Safari versions antérieures à 10.1 | ||
| Apple | N/A | Pages versions antérieures à 6.1, Numbers versions antérieures à 4.1 et Keynote versions antérieures à 7.1 pour Mac |
| Title | Publication Time | Tags | ||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "watchOS versions ant\u00e9rieures \u00e0 3.2",
"product": {
"name": "N/A",
"vendor": {
"name": "Apple",
"scada": false
}
}
},
{
"description": "iOS versions ant\u00e9rieures \u00e0 10.3",
"product": {
"name": "N/A",
"vendor": {
"name": "Apple",
"scada": false
}
}
},
{
"description": "Pages versions ant\u00e9rieures \u00e0 3.1, Numbers versions ant\u00e9rieures \u00e0 3.1 et Keynote versions ant\u00e9rieures \u00e0 3.1 pour iOS",
"product": {
"name": "N/A",
"vendor": {
"name": "Apple",
"scada": false
}
}
},
{
"description": "macOS Yosemite sans le Security Update 2017-001",
"product": {
"name": "macOS",
"vendor": {
"name": "Apple",
"scada": false
}
}
},
{
"description": "macOS Server versions ant\u00e9rieures \u00e0 5.3",
"product": {
"name": "macOS",
"vendor": {
"name": "Apple",
"scada": false
}
}
},
{
"description": "macOS Sierra versions ant\u00e9rieures \u00e0 10.12.4",
"product": {
"name": "macOS",
"vendor": {
"name": "Apple",
"scada": false
}
}
},
{
"description": "macOS El Capitan sans le Security Update 2017-001",
"product": {
"name": "macOS",
"vendor": {
"name": "Apple",
"scada": false
}
}
},
{
"description": "tvOS versions ant\u00e9rieures \u00e0 10.2",
"product": {
"name": "N/A",
"vendor": {
"name": "Apple",
"scada": false
}
}
},
{
"description": "iCloud pour Windows versions ant\u00e9rieures \u00e0 6.2",
"product": {
"name": "N/A",
"vendor": {
"name": "Apple",
"scada": false
}
}
},
{
"description": "Safari versions ant\u00e9rieures \u00e0 10.1",
"product": {
"name": "Safari",
"vendor": {
"name": "Apple",
"scada": false
}
}
},
{
"description": "Pages versions ant\u00e9rieures \u00e0 6.1, Numbers versions ant\u00e9rieures \u00e0 4.1 et Keynote versions ant\u00e9rieures \u00e0 7.1 pour Mac",
"product": {
"name": "N/A",
"vendor": {
"name": "Apple",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2017-2455",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2455"
},
{
"name": "CVE-2016-7922",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-7922"
},
{
"name": "CVE-2016-7936",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-7936"
},
{
"name": "CVE-2017-2464",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2464"
},
{
"name": "CVE-2017-2397",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2397"
},
{
"name": "CVE-2017-2414",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2414"
},
{
"name": "CVE-2017-2404",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2404"
},
{
"name": "CVE-2017-2376",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2376"
},
{
"name": "CVE-2017-6974",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-6974"
},
{
"name": "CVE-2017-5203",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5203"
},
{
"name": "CVE-2016-7933",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-7933"
},
{
"name": "CVE-2016-0736",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-0736"
},
{
"name": "CVE-2017-5204",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5204"
},
{
"name": "CVE-2017-2400",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2400"
},
{
"name": "CVE-2017-5484",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5484"
},
{
"name": "CVE-2017-2413",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2413"
},
{
"name": "CVE-2017-2391",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2391"
},
{
"name": "CVE-2017-2420",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2420"
},
{
"name": "CVE-2017-2446",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2446"
},
{
"name": "CVE-2016-7993",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-7993"
},
{
"name": "CVE-2016-7932",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-7932"
},
{
"name": "CVE-2017-2431",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2431"
},
{
"name": "CVE-2017-2367",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2367"
},
{
"name": "CVE-2016-7973",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-7973"
},
{
"name": "CVE-2016-8575",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-8575"
},
{
"name": "CVE-2017-2418",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2418"
},
{
"name": "CVE-2017-2412",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2412"
},
{
"name": "CVE-2017-2426",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2426"
},
{
"name": "CVE-2017-2448",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2448"
},
{
"name": "CVE-2017-2462",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2462"
},
{
"name": "CVE-2016-9540",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-9540"
},
{
"name": "CVE-2017-2452",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2452"
},
{
"name": "CVE-2017-2437",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2437"
},
{
"name": "CVE-2017-2423",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2423"
},
{
"name": "CVE-2017-2472",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2472"
},
{
"name": "CVE-2016-9643",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-9643"
},
{
"name": "CVE-2016-1001",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1001"
},
{
"name": "CVE-2016-8574",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-8574"
},
{
"name": "CVE-2017-2453",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2453"
},
{
"name": "CVE-2017-2487",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2487"
},
{
"name": "CVE-2017-5029",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5029"
},
{
"name": "CVE-2017-2396",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2396"
},
{
"name": "CVE-2017-2475",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2475"
},
{
"name": "CVE-2017-2481",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2481"
},
{
"name": "CVE-2017-5483",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5483"
},
{
"name": "CVE-2017-2440",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2440"
},
{
"name": "CVE-2017-2479",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2479"
},
{
"name": "CVE-2017-2468",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2468"
},
{
"name": "CVE-2017-2388",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2388"
},
{
"name": "CVE-2016-1015",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1015"
},
{
"name": "CVE-2017-2458",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2458"
},
{
"name": "CVE-2017-2471",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2471"
},
{
"name": "CVE-2016-7975",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-7975"
},
{
"name": "CVE-2016-7986",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-7986"
},
{
"name": "CVE-2017-2406",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2406"
},
{
"name": "CVE-2017-5485",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5485"
},
{
"name": "CVE-2017-2441",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2441"
},
{
"name": "CVE-2016-5636",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-5636"
},
{
"name": "CVE-2017-2443",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2443"
},
{
"name": "CVE-2016-8740",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-8740"
},
{
"name": "CVE-2016-7934",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-7934"
},
{
"name": "CVE-2017-2463",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2463"
},
{
"name": "CVE-2017-2392",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2392"
},
{
"name": "CVE-2016-9533",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-9533"
},
{
"name": "CVE-2017-2428",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2428"
},
{
"name": "CVE-2016-7928",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-7928"
},
{
"name": "CVE-2017-2439",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2439"
},
{
"name": "CVE-2017-2408",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2408"
},
{
"name": "CVE-2017-2390",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2390"
},
{
"name": "CVE-2016-0751",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-0751"
},
{
"name": "CVE-2017-2449",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2449"
},
{
"name": "CVE-2016-7927",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-7927"
},
{
"name": "CVE-2017-2383",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2383"
},
{
"name": "CVE-2017-2483",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2483"
},
{
"name": "CVE-2007-6750",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-6750"
},
{
"name": "CVE-2016-2161",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-2161"
},
{
"name": "CVE-2016-9536",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-9536"
},
{
"name": "CVE-2017-2486",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2486"
},
{
"name": "CVE-2017-2465",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2465"
},
{
"name": "CVE-2017-2422",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2422"
},
{
"name": "CVE-2016-7974",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-7974"
},
{
"name": "CVE-2017-2425",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2425"
},
{
"name": "CVE-2017-5341",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5341"
},
{
"name": "CVE-2017-2399",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2399"
},
{
"name": "CVE-2017-2389",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2389"
},
{
"name": "CVE-2017-2485",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2485"
},
{
"name": "CVE-2016-7935",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-7935"
},
{
"name": "CVE-2017-2478",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2478"
},
{
"name": "CVE-2017-2467",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2467"
},
{
"name": "CVE-2016-5387",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-5387"
},
{
"name": "CVE-2017-2435",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2435"
},
{
"name": "CVE-2016-9537",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-9537"
},
{
"name": "CVE-2017-2407",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2407"
},
{
"name": "CVE-2017-2385",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2385"
},
{
"name": "CVE-2017-2424",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2424"
},
{
"name": "CVE-2017-2436",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2436"
},
{
"name": "CVE-2017-2454",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2454"
},
{
"name": "CVE-2016-7984",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-7984"
},
{
"name": "CVE-2016-7585",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-7585"
},
{
"name": "CVE-2016-9935",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-9935"
},
{
"name": "CVE-2016-7931",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-7931"
},
{
"name": "CVE-2017-2378",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2378"
},
{
"name": "CVE-2016-7939",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-7939"
},
{
"name": "CVE-2017-2377",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2377"
},
{
"name": "CVE-2017-2402",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2402"
},
{
"name": "CVE-2017-2427",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2427"
},
{
"name": "CVE-2017-2473",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2473"
},
{
"name": "CVE-2017-2398",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2398"
},
{
"name": "CVE-2017-2469",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2469"
},
{
"name": "CVE-2016-3619",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-3619"
},
{
"name": "CVE-2017-2459",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2459"
},
{
"name": "CVE-2017-2386",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2386"
},
{
"name": "CVE-2017-2401",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2401"
},
{
"name": "CVE-2016-7923",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-7923"
},
{
"name": "CVE-2017-2419",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2419"
},
{
"name": "CVE-2017-2474",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2474"
},
{
"name": "CVE-2016-7985",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-7985"
},
{
"name": "CVE-2016-9539",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-9539"
},
{
"name": "CVE-2017-2409",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2409"
},
{
"name": "CVE-2016-7992",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-7992"
},
{
"name": "CVE-2017-2380",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2380"
},
{
"name": "CVE-2017-2484",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2484"
},
{
"name": "CVE-2017-2466",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2466"
},
{
"name": "CVE-2017-2393",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2393"
},
{
"name": "CVE-2017-2395",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2395"
},
{
"name": "CVE-2017-2445",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2445"
},
{
"name": "CVE-2016-7929",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-7929"
},
{
"name": "CVE-2017-2442",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2442"
},
{
"name": "CVE-2017-2416",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2416"
},
{
"name": "CVE-2017-2444",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2444"
},
{
"name": "CVE-2017-2364",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2364"
},
{
"name": "CVE-2017-5342",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5342"
},
{
"name": "CVE-2017-2415",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2415"
},
{
"name": "CVE-2017-2379",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2379"
},
{
"name": "CVE-2017-2457",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2457"
},
{
"name": "CVE-2017-2434",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2434"
},
{
"name": "CVE-2017-2382",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2382"
},
{
"name": "CVE-2017-2381",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2381"
},
{
"name": "CVE-2017-2410",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2410"
},
{
"name": "CVE-2016-9586",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-9586"
},
{
"name": "CVE-2017-2421",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2421"
},
{
"name": "CVE-2017-5205",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5205"
},
{
"name": "CVE-2016-7940",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-7940"
},
{
"name": "CVE-2017-2438",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2438"
},
{
"name": "CVE-2017-2460",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2460"
},
{
"name": "CVE-2017-5482",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5482"
},
{
"name": "CVE-2016-7926",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-7926"
},
{
"name": "CVE-2017-2403",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2403"
},
{
"name": "CVE-2017-2461",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2461"
},
{
"name": "CVE-2017-2384",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2384"
},
{
"name": "CVE-2017-5486",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5486"
},
{
"name": "CVE-2016-7937",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-7937"
},
{
"name": "CVE-2016-7983",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-7983"
},
{
"name": "CVE-2016-1016",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1016"
},
{
"name": "CVE-2016-9642",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-9642"
},
{
"name": "CVE-2016-7925",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-7925"
},
{
"name": "CVE-2017-2405",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2405"
},
{
"name": "CVE-2017-2417",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2417"
},
{
"name": "CVE-2017-2447",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2447"
},
{
"name": "CVE-2017-2482",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2482"
},
{
"name": "CVE-2017-2451",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2451"
},
{
"name": "CVE-2017-2430",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2430"
},
{
"name": "CVE-2016-7930",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-7930"
},
{
"name": "CVE-2017-2456",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2456"
},
{
"name": "CVE-2016-7056",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-7056"
},
{
"name": "CVE-2017-2432",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2432"
},
{
"name": "CVE-2016-8743",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-8743"
},
{
"name": "CVE-2017-2470",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2470"
},
{
"name": "CVE-2016-9538",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-9538"
},
{
"name": "CVE-2017-2476",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2476"
},
{
"name": "CVE-2016-7938",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-7938"
},
{
"name": "CVE-2017-5202",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5202"
},
{
"name": "CVE-2016-1000",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1000"
},
{
"name": "CVE-2017-2433",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2433"
},
{
"name": "CVE-2017-2450",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2450"
},
{
"name": "CVE-2017-2480",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2480"
},
{
"name": "CVE-2016-9535",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-9535"
},
{
"name": "CVE-2016-7924",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-7924"
},
{
"name": "CVE-2017-2429",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2429"
},
{
"name": "CVE-2017-2394",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2394"
}
],
"links": [],
"reference": "CERTFR-2017-AVI-092",
"revisions": [
{
"description": "version initiale.",
"revision_date": "2017-03-28T00:00:00.000000"
},
{
"description": "ajout des informations li\u00e9es au bulletin de s\u00e9curit\u00e9 HT207607.",
"revision_date": "2017-03-29T00:00:00.000000"
}
],
"risks": [
{
"description": "Injection de code indirecte \u00e0 distance"
},
{
"description": "Ex\u00e9cution de code arbitraire"
},
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "D\u00e9ni de service"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 corrig\u00e9es dans \u003cspan\nclass=\"textit\"\u003eles produits Apple\u003c/span\u003e. Certaines d\u0027entre elles\npermettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire,\nun d\u00e9ni de service \u00e0 distance et un d\u00e9ni de service.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Apple",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Apple HT207604 du 27 mars 2017",
"url": "https://support.apple.com/en-us/HT207604"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Apple HT207607 du 28 mars 2017",
"url": "https://support.apple.com/en-us/HT207607"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Apple HT207615 du 27 mars 2017",
"url": "https://support.apple.com/en-us/HT207615"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Apple HT207602 du 27 mars 2017",
"url": "https://support.apple.com/en-us/HT207602"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Apple HT207600 du 27 mars 2017",
"url": "https://support.apple.com/en-us/HT207600"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Apple HT207595 du 27 mars 2017",
"url": "https://support.apple.com/en-us/HT207595"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Apple HT207601 du 27 mars 2017",
"url": "https://support.apple.com/en-us/HT207601"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Apple HT207617 du 27 mars 2017",
"url": "https://support.apple.com/en-us/HT207617"
}
]
}
CERTFR-2017-AVI-385
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans les produits Apple . Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, un déni de service à distance et un contournement de la politique de sécurité.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| Apple | N/A | iOS versions antérieures à 11.1 | ||
| Apple | N/A | watchOS versions antérieures à 4.1 | ||
| Apple | macOS | macOS Sierra versions sans le correctif de sécurité 2017-001 | ||
| Apple | N/A | tvOS versions antérieures à 11.1 | ||
| Apple | macOS | macOS El Capitan sans le correctif de sécurité 2017-004 | ||
| Apple | N/A | iTunes versions antérieures à 12.7.1 sur Windows | ||
| Apple | N/A | iCloud pour Windows versions antérieures à 7.1 | ||
| Apple | Safari | Safari versions antérieures à 11.0.1 | ||
| Apple | macOS | macOS High Sierra versions antérieures à 10.13.1 |
| Title | Publication Time | Tags | |||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "iOS versions ant\u00e9rieures \u00e0 11.1",
"product": {
"name": "N/A",
"vendor": {
"name": "Apple",
"scada": false
}
}
},
{
"description": "watchOS versions ant\u00e9rieures \u00e0 4.1",
"product": {
"name": "N/A",
"vendor": {
"name": "Apple",
"scada": false
}
}
},
{
"description": "macOS Sierra versions sans le correctif de s\u00e9curit\u00e9 2017-001",
"product": {
"name": "macOS",
"vendor": {
"name": "Apple",
"scada": false
}
}
},
{
"description": "tvOS versions ant\u00e9rieures \u00e0 11.1",
"product": {
"name": "N/A",
"vendor": {
"name": "Apple",
"scada": false
}
}
},
{
"description": "macOS El Capitan sans le correctif de s\u00e9curit\u00e9 2017-004",
"product": {
"name": "macOS",
"vendor": {
"name": "Apple",
"scada": false
}
}
},
{
"description": "iTunes versions ant\u00e9rieures \u00e0 12.7.1 sur Windows",
"product": {
"name": "N/A",
"vendor": {
"name": "Apple",
"scada": false
}
}
},
{
"description": "iCloud pour Windows versions ant\u00e9rieures \u00e0 7.1",
"product": {
"name": "N/A",
"vendor": {
"name": "Apple",
"scada": false
}
}
},
{
"description": "Safari versions ant\u00e9rieures \u00e0 11.0.1",
"product": {
"name": "Safari",
"vendor": {
"name": "Apple",
"scada": false
}
}
},
{
"description": "macOS High Sierra versions ant\u00e9rieures \u00e0 10.13.1",
"product": {
"name": "macOS",
"vendor": {
"name": "Apple",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2017-13802",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13802"
},
{
"name": "CVE-2017-13818",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13818"
},
{
"name": "CVE-2017-13052",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13052"
},
{
"name": "CVE-2017-12993",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-12993"
},
{
"name": "CVE-2017-13018",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13018"
},
{
"name": "CVE-2017-13043",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13043"
},
{
"name": "CVE-2017-3169",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3169"
},
{
"name": "CVE-2017-9789",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-9789"
},
{
"name": "CVE-2017-7659",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7659"
},
{
"name": "CVE-2016-4736",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-4736"
},
{
"name": "CVE-2017-13050",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13050"
},
{
"name": "CVE-2017-13816",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13816"
},
{
"name": "CVE-2017-13798",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13798"
},
{
"name": "CVE-2017-11108",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-11108"
},
{
"name": "CVE-2017-13017",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13017"
},
{
"name": "CVE-2017-13831",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13831"
},
{
"name": "CVE-2017-11543",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-11543"
},
{
"name": "CVE-2017-13790",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13790"
},
{
"name": "CVE-2017-13000",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13000"
},
{
"name": "CVE-2017-13807",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13807"
},
{
"name": "CVE-2017-13843",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13843"
},
{
"name": "CVE-2017-13055",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13055"
},
{
"name": "CVE-2017-7668",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7668"
},
{
"name": "CVE-2017-13041",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13041"
},
{
"name": "CVE-2017-12902",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-12902"
},
{
"name": "CVE-2017-13834",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13834"
},
{
"name": "CVE-2017-13007",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13007"
},
{
"name": "CVE-2017-13687",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13687"
},
{
"name": "CVE-2017-13078",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13078"
},
{
"name": "CVE-2017-12986",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-12986"
},
{
"name": "CVE-2017-13821",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13821"
},
{
"name": "CVE-2017-13033",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13033"
},
{
"name": "CVE-2017-13817",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13817"
},
{
"name": "CVE-2017-13799",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13799"
},
{
"name": "CVE-2017-12901",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-12901"
},
{
"name": "CVE-2017-13832",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13832"
},
{
"name": "CVE-2017-13011",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13011"
},
{
"name": "CVE-2017-13046",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13046"
},
{
"name": "CVE-2017-13840",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13840"
},
{
"name": "CVE-2017-12897",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-12897"
},
{
"name": "CVE-2017-13809",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13809"
},
{
"name": "CVE-2017-13822",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13822"
},
{
"name": "CVE-2017-7113",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7113"
},
{
"name": "CVE-2017-13800",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13800"
},
{
"name": "CVE-2017-13786",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13786"
},
{
"name": "CVE-2017-13003",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13003"
},
{
"name": "CVE-2017-13815",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13815"
},
{
"name": "CVE-2017-13013",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13013"
},
{
"name": "CVE-2017-13001",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13001"
},
{
"name": "CVE-2017-13009",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13009"
},
{
"name": "CVE-2017-1000101",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-1000101"
},
{
"name": "CVE-2016-8740",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-8740"
},
{
"name": "CVE-2017-13048",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13048"
},
{
"name": "CVE-2017-13054",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13054"
},
{
"name": "CVE-2017-13038",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13038"
},
{
"name": "CVE-2017-13841",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13841"
},
{
"name": "CVE-2017-13010",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13010"
},
{
"name": "CVE-2017-12990",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-12990"
},
{
"name": "CVE-2017-13783",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13783"
},
{
"name": "CVE-2017-13047",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13047"
},
{
"name": "CVE-2017-12991",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-12991"
},
{
"name": "CVE-2017-13805",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13805"
},
{
"name": "CVE-2017-13811",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13811"
},
{
"name": "CVE-2017-13849",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13849"
},
{
"name": "CVE-2017-13032",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13032"
},
{
"name": "CVE-2017-13801",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13801"
},
{
"name": "CVE-2017-13051",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13051"
},
{
"name": "CVE-2017-13036",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13036"
},
{
"name": "CVE-2017-9788",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-9788"
},
{
"name": "CVE-2017-13844",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13844"
},
{
"name": "CVE-2016-2161",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-2161"
},
{
"name": "CVE-2017-13795",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13795"
},
{
"name": "CVE-2017-13690",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13690"
},
{
"name": "CVE-2017-13838",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13838"
},
{
"name": "CVE-2017-11542",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-11542"
},
{
"name": "CVE-2017-13842",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13842"
},
{
"name": "CVE-2017-12997",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-12997"
},
{
"name": "CVE-2017-13045",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13045"
},
{
"name": "CVE-2017-13026",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13026"
},
{
"name": "CVE-2017-13785",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13785"
},
{
"name": "CVE-2016-5387",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-5387"
},
{
"name": "CVE-2017-13796",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13796"
},
{
"name": "CVE-2017-13782",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13782"
},
{
"name": "CVE-2017-13784",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13784"
},
{
"name": "CVE-2017-13042",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13042"
},
{
"name": "CVE-2017-12992",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-12992"
},
{
"name": "CVE-2017-13027",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13027"
},
{
"name": "CVE-2017-13034",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13034"
},
{
"name": "CVE-2017-13794",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13794"
},
{
"name": "CVE-2017-13015",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13015"
},
{
"name": "CVE-2017-13725",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13725"
},
{
"name": "CVE-2017-13819",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13819"
},
{
"name": "CVE-2017-13044",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13044"
},
{
"name": "CVE-2017-12900",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-12900"
},
{
"name": "CVE-2017-12994",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-12994"
},
{
"name": "CVE-2017-12998",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-12998"
},
{
"name": "CVE-2017-13029",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13029"
},
{
"name": "CVE-2017-13037",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13037"
},
{
"name": "CVE-2017-13788",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13788"
},
{
"name": "CVE-2017-7132",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7132"
},
{
"name": "CVE-2017-13810",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13810"
},
{
"name": "CVE-2017-13039",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13039"
},
{
"name": "CVE-2017-13791",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13791"
},
{
"name": "CVE-2017-13023",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13023"
},
{
"name": "CVE-2017-13020",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13020"
},
{
"name": "CVE-2017-13021",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13021"
},
{
"name": "CVE-2017-3167",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3167"
},
{
"name": "CVE-2017-12896",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-12896"
},
{
"name": "CVE-2017-13824",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13824"
},
{
"name": "CVE-2017-13049",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13049"
},
{
"name": "CVE-2017-12999",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-12999"
},
{
"name": "CVE-2017-13836",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13836"
},
{
"name": "CVE-2017-13823",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13823"
},
{
"name": "CVE-2017-13846",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13846"
},
{
"name": "CVE-2017-12988",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-12988"
},
{
"name": "CVE-2017-13789",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13789"
},
{
"name": "CVE-2017-12985",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-12985"
},
{
"name": "CVE-2017-12899",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-12899"
},
{
"name": "CVE-2017-7679",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7679"
},
{
"name": "CVE-2017-13014",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13014"
},
{
"name": "CVE-2017-12894",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-12894"
},
{
"name": "CVE-2017-13804",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13804"
},
{
"name": "CVE-2017-13024",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13024"
},
{
"name": "CVE-2017-13004",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13004"
},
{
"name": "CVE-2017-12996",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-12996"
},
{
"name": "CVE-2017-13830",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13830"
},
{
"name": "CVE-2017-12893",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-12893"
},
{
"name": "CVE-2017-13019",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13019"
},
{
"name": "CVE-2017-13030",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13030"
},
{
"name": "CVE-2017-13808",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13808"
},
{
"name": "CVE-2017-13813",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13813"
},
{
"name": "CVE-2017-1000100",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-1000100"
},
{
"name": "CVE-2017-13053",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13053"
},
{
"name": "CVE-2017-13040",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13040"
},
{
"name": "CVE-2017-13689",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13689"
},
{
"name": "CVE-2017-11103",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-11103"
},
{
"name": "CVE-2017-13005",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13005"
},
{
"name": "CVE-2017-13793",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13793"
},
{
"name": "CVE-2017-13814",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13814"
},
{
"name": "CVE-2017-12987",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-12987"
},
{
"name": "CVE-2017-13826",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13826"
},
{
"name": "CVE-2017-11541",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-11541"
},
{
"name": "CVE-2017-13025",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13025"
},
{
"name": "CVE-2017-13828",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13828"
},
{
"name": "CVE-2017-13688",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13688"
},
{
"name": "CVE-2017-13820",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13820"
},
{
"name": "CVE-2017-12995",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-12995"
},
{
"name": "CVE-2017-13792",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13792"
},
{
"name": "CVE-2017-13031",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13031"
},
{
"name": "CVE-2017-13028",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13028"
},
{
"name": "CVE-2017-13825",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13825"
},
{
"name": "CVE-2016-8743",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-8743"
},
{
"name": "CVE-2017-13803",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13803"
},
{
"name": "CVE-2017-13006",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13006"
},
{
"name": "CVE-2017-12895",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-12895"
},
{
"name": "CVE-2017-13812",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13812"
},
{
"name": "CVE-2017-13022",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13022"
},
{
"name": "CVE-2017-13012",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13012"
},
{
"name": "CVE-2017-13002",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13002"
},
{
"name": "CVE-2017-13035",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13035"
},
{
"name": "CVE-2017-12989",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-12989"
},
{
"name": "CVE-2017-13077",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13077"
},
{
"name": "CVE-2017-13016",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13016"
},
{
"name": "CVE-2017-13080",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13080"
},
{
"name": "CVE-2017-12898",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-12898"
},
{
"name": "CVE-2017-13008",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13008"
}
],
"links": [],
"reference": "CERTFR-2017-AVI-385",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2017-11-02T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits Apple\n. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une\nex\u00e9cution de code arbitraire \u00e0 distance, un d\u00e9ni de service \u00e0 distance\net un contournement de la politique de s\u00e9curit\u00e9.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Apple",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Apple HT208225 du 31 octobre 2017",
"url": "https://support.apple.com/en-us/HT208225"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Apple HT208222 du 31 octobre 2017",
"url": "https://support.apple.com/en-us/HT208222"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Apple HT208219 du 31 octobre 2017",
"url": "https://support.apple.com/en-us/HT208219"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Apple HT208223 du 31 octobre 2017",
"url": "https://support.apple.com/en-us/HT208223"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Apple HT208220 du 31 octobre 2017",
"url": "https://support.apple.com/en-us/HT208220"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Apple HT208221 du 31 octobre 2017",
"url": "https://support.apple.com/en-us/HT208221"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Apple HT208224 du 31 octobre 2017",
"url": "https://support.apple.com/en-us/HT208224"
}
]
}
CNVD-2016-13232
Vulnerability from cnvd - Published: 2016-12-28目前厂商已经发布了升级补丁以修复此安全问题,补丁获取链接: http://httpd.apache.org/security/vulnerabilities_24.html
| Name | Apache HTTP Server <2.4.25 |
|---|
{
"bids": {
"bid": {
"bidNumber": "95076"
}
},
"cves": {
"cve": {
"cveNumber": "CVE-2016-2161"
}
},
"description": "Apache httpd\u662f\u7f8e\u56fd\u963f\u5e15\u5947\uff08Apache\uff09\u8f6f\u4ef6\u57fa\u91d1\u4f1a\u7684\u4e00\u6b3e\u4e13\u4e3a\u73b0\u4ee3\u64cd\u4f5c\u7cfb\u7edf\u5f00\u53d1\u548c\u7ef4\u62a4\u7684\u5f00\u6e90HTTP\u670d\u52a1\u5668\u3002\r\n\r\nApache httpd 2.4.25\u4e4b\u524d\u7684\u7248\u672c\u4e2d\u5b58\u5728\u5b89\u5168\u6f0f\u6d1e\uff0c\u8be5\u6f0f\u6d1e\u6e90\u4e8e\u7a0b\u5e8f\u672a\u80fd\u6b63\u786e\u7684\u89e3\u6790HTTP\u5934\u6570\u636e\u3002\u8fdc\u7a0b\u653b\u51fb\u8005\u53ef\u901a\u8fc7\u5411 mod_auth_digest\u63d0\u4ea4\u7279\u5236\u7684\u6570\u636e\u9020\u6210\u670d\u52a1\u5d29\u6e83\u3002",
"discovererName": "Maksim Malyutin",
"formalWay": "\u76ee\u524d\u5382\u5546\u5df2\u7ecf\u53d1\u5e03\u4e86\u5347\u7ea7\u8865\u4e01\u4ee5\u4fee\u590d\u6b64\u5b89\u5168\u95ee\u9898\uff0c\u8865\u4e01\u83b7\u53d6\u94fe\u63a5\uff1a\r\nhttp://httpd.apache.org/security/vulnerabilities_24.html",
"isEvent": "\u901a\u7528\u8f6f\u786c\u4ef6\u6f0f\u6d1e",
"number": "CNVD-2016-13232",
"openTime": "2016-12-28",
"patchDescription": "Apache httpd\u662f\u7f8e\u56fd\u963f\u5e15\u5947\uff08Apache\uff09\u8f6f\u4ef6\u57fa\u91d1\u4f1a\u7684\u4e00\u6b3e\u4e13\u4e3a\u73b0\u4ee3\u64cd\u4f5c\u7cfb\u7edf\u5f00\u53d1\u548c\u7ef4\u62a4\u7684\u5f00\u6e90HTTP\u670d\u52a1\u5668\u3002\r\n\r\nApache httpd 2.4.25\u4e4b\u524d\u7684\u7248\u672c\u4e2d\u5b58\u5728\u5b89\u5168\u6f0f\u6d1e\uff0c\u8be5\u6f0f\u6d1e\u6e90\u4e8e\u7a0b\u5e8f\u672a\u80fd\u6b63\u786e\u7684\u89e3\u6790HTTP\u5934\u6570\u636e\u3002\u8fdc\u7a0b\u653b\u51fb\u8005\u53ef\u901a\u8fc7\u5411 mod_auth_digest\u63d0\u4ea4\u7279\u5236\u7684\u6570\u636e\u9020\u6210\u670d\u52a1\u5d29\u6e83\u3002\u76ee\u524d\uff0c\u4f9b\u5e94\u5546\u53d1\u5e03\u4e86\u5b89\u5168\u516c\u544a\u53ca\u76f8\u5173\u8865\u4e01\u4fe1\u606f\uff0c\u4fee\u590d\u4e86\u6b64\u6f0f\u6d1e\u3002",
"patchName": "Apache HTTP Server\u62d2\u7edd\u670d\u52a1\u6f0f\u6d1e\uff08CNVD-2016-13232\uff09\u7684\u8865\u4e01",
"products": {
"product": "Apache HTTP Server \u003c2.4.25"
},
"referenceLink": "http://www.securityfocus.com/bid/95076",
"serverity": "\u4e2d",
"submitTime": "2016-12-26",
"title": "Apache HTTP Server\u62d2\u7edd\u670d\u52a1\u6f0f\u6d1e\uff08CNVD-2016-13232\uff09"
}
FKIE_CVE-2016-2161
Vulnerability from fkie_nvd - Published: 2017-07-27 21:29 - Updated: 2026-05-13 00:24| Vendor | Product | Version | |
|---|---|---|---|
| apache | http_server | 2.4.0 | |
| apache | http_server | 2.4.1 | |
| apache | http_server | 2.4.2 | |
| apache | http_server | 2.4.3 | |
| apache | http_server | 2.4.6 | |
| apache | http_server | 2.4.7 | |
| apache | http_server | 2.4.8 | |
| apache | http_server | 2.4.9 | |
| apache | http_server | 2.4.10 | |
| apache | http_server | 2.4.12 | |
| apache | http_server | 2.4.14 | |
| apache | http_server | 2.4.16 | |
| apache | http_server | 2.4.19 | |
| apache | http_server | 2.4.20 | |
| apache | http_server | 2.4.21 | |
| apache | http_server | 2.4.22 | |
| apache | http_server | 2.4.23 |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:apache:http_server:2.4.0:*:*:*:*:*:*:*",
"matchCriteriaId": "BDC40E89-2D57-4988-913E-024BFB56B367",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:http_server:2.4.1:*:*:*:*:*:*:*",
"matchCriteriaId": "6FCD3C8C-9BF8-4F30-981A-593EEAEB9EDD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:http_server:2.4.2:*:*:*:*:*:*:*",
"matchCriteriaId": "046487A3-752B-4D0F-8984-96486B828EAB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:http_server:2.4.3:*:*:*:*:*:*:*",
"matchCriteriaId": "89D2E052-51CD-4B57-A8B8-FAE51988D654",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:http_server:2.4.6:*:*:*:*:*:*:*",
"matchCriteriaId": "8FEAB0DF-04A9-4F99-8666-0BADC5D642B8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:http_server:2.4.7:*:*:*:*:*:*:*",
"matchCriteriaId": "E7D924D1-8A36-4C43-9E56-52814F9A6350",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:http_server:2.4.8:*:*:*:*:*:*:*",
"matchCriteriaId": "DFA089AB-AF28-4AE1-AE39-6D1B8192A3DF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:http_server:2.4.9:*:*:*:*:*:*:*",
"matchCriteriaId": "39CDFECC-E26D-47E0-976F-6629040B3764",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:http_server:2.4.10:*:*:*:*:*:*:*",
"matchCriteriaId": "E3ECBCB1-0675-41F5-857B-438F36925F63",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:http_server:2.4.12:*:*:*:*:*:*:*",
"matchCriteriaId": "CB6CBFBF-74F6-42AF-BC79-AA53EA75F00B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:http_server:2.4.14:*:*:*:*:*:*:*",
"matchCriteriaId": "69CB1C41-0360-44D0-B73A-273B0DDE46D5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:http_server:2.4.16:*:*:*:*:*:*:*",
"matchCriteriaId": "8717A96B-9DB5-48D6-A2CF-A5E2B26AF3F3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:http_server:2.4.19:*:*:*:*:*:*:*",
"matchCriteriaId": "2AE538EE-7152-4DB5-AE45-614494CB7B95",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:http_server:2.4.20:*:*:*:*:*:*:*",
"matchCriteriaId": "B803D25B-0A19-4569-BA05-09D58F33917C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:http_server:2.4.21:*:*:*:*:*:*:*",
"matchCriteriaId": "BE253E49-9A56-49C8-B1D8-E23BB3D5D1D7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:http_server:2.4.22:*:*:*:*:*:*:*",
"matchCriteriaId": "DE5A73E5-1A04-420B-92B2-B90FD970005C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:http_server:2.4.23:*:*:*:*:*:*:*",
"matchCriteriaId": "8510442C-212F-4013-85FA-E0AB59F6F2C6",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In Apache HTTP Server versions 2.4.0 to 2.4.23, malicious input to mod_auth_digest can cause the server to crash, and each instance continues to crash even for subsequently valid requests."
},
{
"lang": "es",
"value": "En Apache HTTP Server versiones 2.4.0 hasta 2.4.23, una entrada maliciosa a mod_auth_digest puede causar que el servidor se bloquee y cada instancia contin\u00faa bloqueado incluso para las peticiones v\u00e1lidas posteriormente."
}
],
"id": "CVE-2016-2161",
"lastModified": "2026-05-13T00:24:29.033",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5.0,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV30": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2017-07-27T21:29:00.257",
"references": [
{
"source": "security@apache.org",
"url": "http://rhn.redhat.com/errata/RHSA-2017-1415.html"
},
{
"source": "security@apache.org",
"url": "http://www.debian.org/security/2017/dsa-3796"
},
{
"source": "security@apache.org",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "http://www.securityfocus.com/bid/95076"
},
{
"source": "security@apache.org",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "http://www.securitytracker.com/id/1037508"
},
{
"source": "security@apache.org",
"url": "https://access.redhat.com/errata/RHSA-2017:0906"
},
{
"source": "security@apache.org",
"url": "https://access.redhat.com/errata/RHSA-2017:1161"
},
{
"source": "security@apache.org",
"url": "https://access.redhat.com/errata/RHSA-2017:1413"
},
{
"source": "security@apache.org",
"url": "https://access.redhat.com/errata/RHSA-2017:1414"
},
{
"source": "security@apache.org",
"tags": [
"Third Party Advisory"
],
"url": "https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbux03725en_us"
},
{
"source": "security@apache.org",
"tags": [
"Vendor Advisory"
],
"url": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2016-2161"
},
{
"source": "security@apache.org",
"url": "https://lists.apache.org/thread.html/56c2e7cc9deb1c12a843d0dc251ea7fd3e7e80293cde02fcd65286ba%40%3Ccvs.httpd.apache.org%3E"
},
{
"source": "security@apache.org",
"url": "https://lists.apache.org/thread.html/84a3714f0878781f6ed84473d1a503d2cc382277e100450209231830%40%3Ccvs.httpd.apache.org%3E"
},
{
"source": "security@apache.org",
"url": "https://lists.apache.org/thread.html/r04e89e873d54116a0635ef2f7061c15acc5ed27ef7500997beb65d6f%40%3Ccvs.httpd.apache.org%3E"
},
{
"source": "security@apache.org",
"url": "https://lists.apache.org/thread.html/r76142b8c5119df2178be7c2dba88fde552eedeec37ea993dfce68d1d%40%3Ccvs.httpd.apache.org%3E"
},
{
"source": "security@apache.org",
"url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E"
},
{
"source": "security@apache.org",
"url": "https://lists.apache.org/thread.html/rb14daf9cc4e28d18cdc15d6a6ca74e565672fabf7ad89541071d008b%40%3Ccvs.httpd.apache.org%3E"
},
{
"source": "security@apache.org",
"url": "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a%40%3Ccvs.httpd.apache.org%3E"
},
{
"source": "security@apache.org",
"url": "https://lists.apache.org/thread.html/rcc44594d4d6579b90deccd4536b5d31f099ef563df39b094be286b9e%40%3Ccvs.httpd.apache.org%3E"
},
{
"source": "security@apache.org",
"url": "https://lists.apache.org/thread.html/rd18c3c43602e66f9cdcf09f1de233804975b9572b0456cc582390b6f%40%3Ccvs.httpd.apache.org%3E"
},
{
"source": "security@apache.org",
"url": "https://lists.apache.org/thread.html/rd336919f655b7ff309385e34a143e41c503e133da80414485b3abcc9%40%3Ccvs.httpd.apache.org%3E"
},
{
"source": "security@apache.org",
"url": "https://lists.apache.org/thread.html/re1e3a24664d35bcd0a0e793e0b5fc6ca6c107f99a1b2c545c5d4b467%40%3Ccvs.httpd.apache.org%3E"
},
{
"source": "security@apache.org",
"url": "https://lists.apache.org/thread.html/re3d27b6250aa8548b8845d314bb8a350b3df326cacbbfdfe4d455234%40%3Ccvs.httpd.apache.org%3E"
},
{
"source": "security@apache.org",
"url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E"
},
{
"source": "security@apache.org",
"tags": [
"Third Party Advisory"
],
"url": "https://security.gentoo.org/glsa/201701-36"
},
{
"source": "security@apache.org",
"url": "https://security.netapp.com/advisory/ntap-20180423-0001/"
},
{
"source": "security@apache.org",
"url": "https://support.apple.com/HT208221"
},
{
"source": "security@apache.org",
"url": "https://www.tenable.com/security/tns-2017-04"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://rhn.redhat.com/errata/RHSA-2017-1415.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.debian.org/security/2017/dsa-3796"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "http://www.securityfocus.com/bid/95076"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "http://www.securitytracker.com/id/1037508"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://access.redhat.com/errata/RHSA-2017:0906"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://access.redhat.com/errata/RHSA-2017:1161"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://access.redhat.com/errata/RHSA-2017:1413"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://access.redhat.com/errata/RHSA-2017:1414"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbux03725en_us"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2016-2161"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://lists.apache.org/thread.html/56c2e7cc9deb1c12a843d0dc251ea7fd3e7e80293cde02fcd65286ba%40%3Ccvs.httpd.apache.org%3E"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://lists.apache.org/thread.html/84a3714f0878781f6ed84473d1a503d2cc382277e100450209231830%40%3Ccvs.httpd.apache.org%3E"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://lists.apache.org/thread.html/r04e89e873d54116a0635ef2f7061c15acc5ed27ef7500997beb65d6f%40%3Ccvs.httpd.apache.org%3E"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://lists.apache.org/thread.html/r76142b8c5119df2178be7c2dba88fde552eedeec37ea993dfce68d1d%40%3Ccvs.httpd.apache.org%3E"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://lists.apache.org/thread.html/rb14daf9cc4e28d18cdc15d6a6ca74e565672fabf7ad89541071d008b%40%3Ccvs.httpd.apache.org%3E"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a%40%3Ccvs.httpd.apache.org%3E"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://lists.apache.org/thread.html/rcc44594d4d6579b90deccd4536b5d31f099ef563df39b094be286b9e%40%3Ccvs.httpd.apache.org%3E"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://lists.apache.org/thread.html/rd18c3c43602e66f9cdcf09f1de233804975b9572b0456cc582390b6f%40%3Ccvs.httpd.apache.org%3E"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://lists.apache.org/thread.html/rd336919f655b7ff309385e34a143e41c503e133da80414485b3abcc9%40%3Ccvs.httpd.apache.org%3E"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://lists.apache.org/thread.html/re1e3a24664d35bcd0a0e793e0b5fc6ca6c107f99a1b2c545c5d4b467%40%3Ccvs.httpd.apache.org%3E"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://lists.apache.org/thread.html/re3d27b6250aa8548b8845d314bb8a350b3df326cacbbfdfe4d455234%40%3Ccvs.httpd.apache.org%3E"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://security.gentoo.org/glsa/201701-36"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://security.netapp.com/advisory/ntap-20180423-0001/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://support.apple.com/HT208221"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://www.tenable.com/security/tns-2017-04"
}
],
"sourceIdentifier": "security@apache.org",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-823"
}
],
"source": "security@apache.org",
"type": "Secondary"
},
{
"description": [
{
"lang": "en",
"value": "CWE-20"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
GHSA-3V6F-955W-932H
Vulnerability from github – Published: 2022-05-13 01:09 – Updated: 2025-04-20 03:41In Apache HTTP Server versions 2.4.0 to 2.4.23, malicious input to mod_auth_digest can cause the server to crash, and each instance continues to crash even for subsequently valid requests.
{
"affected": [],
"aliases": [
"CVE-2016-2161"
],
"database_specific": {
"cwe_ids": [
"CWE-20",
"CWE-823"
],
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2017-07-27T21:29:00Z",
"severity": "HIGH"
},
"details": "In Apache HTTP Server versions 2.4.0 to 2.4.23, malicious input to mod_auth_digest can cause the server to crash, and each instance continues to crash even for subsequently valid requests.",
"id": "GHSA-3v6f-955w-932h",
"modified": "2025-04-20T03:41:35Z",
"published": "2022-05-13T01:09:44Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2016-2161"
},
{
"type": "WEB",
"url": "https://access.redhat.com/errata/RHSA-2017:0906"
},
{
"type": "WEB",
"url": "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E"
},
{
"type": "WEB",
"url": "https://lists.apache.org/thread.html/rcc44594d4d6579b90deccd4536b5d31f099ef563df39b094be286b9e%40%3Ccvs.httpd.apache.org%3E"
},
{
"type": "WEB",
"url": "https://lists.apache.org/thread.html/rcc44594d4d6579b90deccd4536b5d31f099ef563df39b094be286b9e@%3Ccvs.httpd.apache.org%3E"
},
{
"type": "WEB",
"url": "https://lists.apache.org/thread.html/rd18c3c43602e66f9cdcf09f1de233804975b9572b0456cc582390b6f%40%3Ccvs.httpd.apache.org%3E"
},
{
"type": "WEB",
"url": "https://lists.apache.org/thread.html/rd18c3c43602e66f9cdcf09f1de233804975b9572b0456cc582390b6f@%3Ccvs.httpd.apache.org%3E"
},
{
"type": "WEB",
"url": "https://lists.apache.org/thread.html/rd336919f655b7ff309385e34a143e41c503e133da80414485b3abcc9%40%3Ccvs.httpd.apache.org%3E"
},
{
"type": "WEB",
"url": "https://lists.apache.org/thread.html/rd336919f655b7ff309385e34a143e41c503e133da80414485b3abcc9@%3Ccvs.httpd.apache.org%3E"
},
{
"type": "WEB",
"url": "https://lists.apache.org/thread.html/re1e3a24664d35bcd0a0e793e0b5fc6ca6c107f99a1b2c545c5d4b467%40%3Ccvs.httpd.apache.org%3E"
},
{
"type": "WEB",
"url": "https://lists.apache.org/thread.html/re1e3a24664d35bcd0a0e793e0b5fc6ca6c107f99a1b2c545c5d4b467@%3Ccvs.httpd.apache.org%3E"
},
{
"type": "WEB",
"url": "https://lists.apache.org/thread.html/re3d27b6250aa8548b8845d314bb8a350b3df326cacbbfdfe4d455234%40%3Ccvs.httpd.apache.org%3E"
},
{
"type": "WEB",
"url": "https://lists.apache.org/thread.html/re3d27b6250aa8548b8845d314bb8a350b3df326cacbbfdfe4d455234@%3Ccvs.httpd.apache.org%3E"
},
{
"type": "WEB",
"url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E"
},
{
"type": "WEB",
"url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
},
{
"type": "WEB",
"url": "https://security.gentoo.org/glsa/201701-36"
},
{
"type": "WEB",
"url": "https://security.netapp.com/advisory/ntap-20180423-0001"
},
{
"type": "WEB",
"url": "https://support.apple.com/HT208221"
},
{
"type": "WEB",
"url": "https://www.tenable.com/security/tns-2017-04"
},
{
"type": "WEB",
"url": "https://access.redhat.com/errata/RHSA-2017:1161"
},
{
"type": "WEB",
"url": "https://access.redhat.com/errata/RHSA-2017:1413"
},
{
"type": "WEB",
"url": "https://access.redhat.com/errata/RHSA-2017:1414"
},
{
"type": "WEB",
"url": "https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbux03725en_us"
},
{
"type": "WEB",
"url": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2016-2161"
},
{
"type": "WEB",
"url": "https://lists.apache.org/thread.html/56c2e7cc9deb1c12a843d0dc251ea7fd3e7e80293cde02fcd65286ba%40%3Ccvs.httpd.apache.org%3E"
},
{
"type": "WEB",
"url": "https://lists.apache.org/thread.html/56c2e7cc9deb1c12a843d0dc251ea7fd3e7e80293cde02fcd65286ba@%3Ccvs.httpd.apache.org%3E"
},
{
"type": "WEB",
"url": "https://lists.apache.org/thread.html/84a3714f0878781f6ed84473d1a503d2cc382277e100450209231830%40%3Ccvs.httpd.apache.org%3E"
},
{
"type": "WEB",
"url": "https://lists.apache.org/thread.html/84a3714f0878781f6ed84473d1a503d2cc382277e100450209231830@%3Ccvs.httpd.apache.org%3E"
},
{
"type": "WEB",
"url": "https://lists.apache.org/thread.html/r04e89e873d54116a0635ef2f7061c15acc5ed27ef7500997beb65d6f%40%3Ccvs.httpd.apache.org%3E"
},
{
"type": "WEB",
"url": "https://lists.apache.org/thread.html/r04e89e873d54116a0635ef2f7061c15acc5ed27ef7500997beb65d6f@%3Ccvs.httpd.apache.org%3E"
},
{
"type": "WEB",
"url": "https://lists.apache.org/thread.html/r76142b8c5119df2178be7c2dba88fde552eedeec37ea993dfce68d1d%40%3Ccvs.httpd.apache.org%3E"
},
{
"type": "WEB",
"url": "https://lists.apache.org/thread.html/r76142b8c5119df2178be7c2dba88fde552eedeec37ea993dfce68d1d@%3Ccvs.httpd.apache.org%3E"
},
{
"type": "WEB",
"url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E"
},
{
"type": "WEB",
"url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E"
},
{
"type": "WEB",
"url": "https://lists.apache.org/thread.html/rb14daf9cc4e28d18cdc15d6a6ca74e565672fabf7ad89541071d008b%40%3Ccvs.httpd.apache.org%3E"
},
{
"type": "WEB",
"url": "https://lists.apache.org/thread.html/rb14daf9cc4e28d18cdc15d6a6ca74e565672fabf7ad89541071d008b@%3Ccvs.httpd.apache.org%3E"
},
{
"type": "WEB",
"url": "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a%40%3Ccvs.httpd.apache.org%3E"
},
{
"type": "WEB",
"url": "http://rhn.redhat.com/errata/RHSA-2017-1415.html"
},
{
"type": "WEB",
"url": "http://www.debian.org/security/2017/dsa-3796"
},
{
"type": "WEB",
"url": "http://www.securityfocus.com/bid/95076"
},
{
"type": "WEB",
"url": "http://www.securitytracker.com/id/1037508"
}
],
"schema_version": "1.4.0",
"severity": [
{
"score": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"type": "CVSS_V3"
}
]
}
GSD-2016-2161
Vulnerability from gsd - Updated: 2023-12-13 01:21{
"GSD": {
"alias": "CVE-2016-2161",
"description": "In Apache HTTP Server versions 2.4.0 to 2.4.23, malicious input to mod_auth_digest can cause the server to crash, and each instance continues to crash even for subsequently valid requests.",
"id": "GSD-2016-2161",
"references": [
"https://www.suse.com/security/cve/CVE-2016-2161.html",
"https://www.debian.org/security/2017/dsa-3796",
"https://access.redhat.com/errata/RHSA-2017:1415",
"https://access.redhat.com/errata/RHSA-2017:1414",
"https://access.redhat.com/errata/RHSA-2017:1413",
"https://access.redhat.com/errata/RHSA-2017:1161",
"https://access.redhat.com/errata/RHSA-2017:0906",
"https://ubuntu.com/security/CVE-2016-2161",
"https://advisories.mageia.org/CVE-2016-2161.html",
"https://alas.aws.amazon.com/cve/html/CVE-2016-2161.html",
"https://linux.oracle.com/cve/CVE-2016-2161.html"
]
},
"gsd": {
"metadata": {
"exploitCode": "unknown",
"remediation": "unknown",
"reportConfidence": "confirmed",
"type": "vulnerability"
},
"osvSchema": {
"aliases": [
"CVE-2016-2161"
],
"details": "In Apache HTTP Server versions 2.4.0 to 2.4.23, malicious input to mod_auth_digest can cause the server to crash, and each instance continues to crash even for subsequently valid requests.",
"id": "GSD-2016-2161",
"modified": "2023-12-13T01:21:19.410008Z",
"schema_version": "1.4.0"
}
},
"namespaces": {
"cve.org": {
"CVE_data_meta": {
"ASSIGNER": "security@apache.org",
"DATE_PUBLIC": "2016-12-20T00:00:00",
"ID": "CVE-2016-2161",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "Apache HTTP Server",
"version": {
"version_data": [
{
"version_value": "2.4.0 to 2.4.23"
}
]
}
}
]
},
"vendor_name": "Apache Software Foundation"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "In Apache HTTP Server versions 2.4.0 to 2.4.23, malicious input to mod_auth_digest can cause the server to crash, and each instance continues to crash even for subsequently valid requests."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Use of Out-of-range Pointer Offset (CWE-823)"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://support.apple.com/HT208221",
"refsource": "CONFIRM",
"url": "https://support.apple.com/HT208221"
},
{
"name": "95076",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/95076"
},
{
"name": "DSA-3796",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2017/dsa-3796"
},
{
"name": "1037508",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1037508"
},
{
"name": "RHSA-2017:1413",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2017:1413"
},
{
"name": "RHSA-2017:1161",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2017:1161"
},
{
"name": "https://www.tenable.com/security/tns-2017-04",
"refsource": "CONFIRM",
"url": "https://www.tenable.com/security/tns-2017-04"
},
{
"name": "RHSA-2017:1414",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2017:1414"
},
{
"name": "https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbux03725en_us",
"refsource": "CONFIRM",
"url": "https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbux03725en_us"
},
{
"name": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2016-2161",
"refsource": "CONFIRM",
"url": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2016-2161"
},
{
"name": "RHSA-2017:1415",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2017-1415.html"
},
{
"name": "RHSA-2017:0906",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2017:0906"
},
{
"name": "GLSA-201701-36",
"refsource": "GENTOO",
"url": "https://security.gentoo.org/glsa/201701-36"
},
{
"name": "https://security.netapp.com/advisory/ntap-20180423-0001/",
"refsource": "CONFIRM",
"url": "https://security.netapp.com/advisory/ntap-20180423-0001/"
},
{
"name": "[httpd-cvs] 20190815 svn commit: r1048743 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
"refsource": "MLIST",
"url": "https://lists.apache.org/thread.html/56c2e7cc9deb1c12a843d0dc251ea7fd3e7e80293cde02fcd65286ba@%3Ccvs.httpd.apache.org%3E"
},
{
"name": "[httpd-cvs] 20190815 svn commit: r1048742 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
"refsource": "MLIST",
"url": "https://lists.apache.org/thread.html/84a3714f0878781f6ed84473d1a503d2cc382277e100450209231830@%3Ccvs.httpd.apache.org%3E"
},
{
"name": "[httpd-cvs] 20200401 svn commit: r1058586 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
"refsource": "MLIST",
"url": "https://lists.apache.org/thread.html/rd18c3c43602e66f9cdcf09f1de233804975b9572b0456cc582390b6f@%3Ccvs.httpd.apache.org%3E"
},
{
"name": "[httpd-cvs] 20200401 svn commit: r1058587 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
"refsource": "MLIST",
"url": "https://lists.apache.org/thread.html/re3d27b6250aa8548b8845d314bb8a350b3df326cacbbfdfe4d455234@%3Ccvs.httpd.apache.org%3E"
},
{
"name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
"refsource": "MLIST",
"url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
},
{
"name": "[httpd-cvs] 20210330 svn commit: r1073140 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
"refsource": "MLIST",
"url": "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E"
},
{
"name": "[httpd-cvs] 20210330 svn commit: r1888194 [10/13] - /httpd/site/trunk/content/security/json/",
"refsource": "MLIST",
"url": "https://lists.apache.org/thread.html/re1e3a24664d35bcd0a0e793e0b5fc6ca6c107f99a1b2c545c5d4b467@%3Ccvs.httpd.apache.org%3E"
},
{
"name": "[httpd-cvs] 20210330 svn commit: r1073139 [10/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
"refsource": "MLIST",
"url": "https://lists.apache.org/thread.html/r04e89e873d54116a0635ef2f7061c15acc5ed27ef7500997beb65d6f@%3Ccvs.httpd.apache.org%3E"
},
{
"name": "[httpd-cvs] 20210330 svn commit: r1073149 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
"refsource": "MLIST",
"url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E"
},
{
"name": "[httpd-cvs] 20210330 svn commit: r1073146 [3/3] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities-httpd.xml security/vulnerabilities_22.html security/vulnerabilities_24.html",
"refsource": "MLIST",
"url": "https://lists.apache.org/thread.html/rcc44594d4d6579b90deccd4536b5d31f099ef563df39b094be286b9e@%3Ccvs.httpd.apache.org%3E"
},
{
"name": "[httpd-cvs] 20210330 svn commit: r1073149 [10/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
"refsource": "MLIST",
"url": "https://lists.apache.org/thread.html/rb14daf9cc4e28d18cdc15d6a6ca74e565672fabf7ad89541071d008b@%3Ccvs.httpd.apache.org%3E"
},
{
"name": "[httpd-cvs] 20210603 svn commit: r1075360 [3/3] - in /websites/staging/httpd/trunk/content: ./ security/json/CVE-2021-31618.json security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
"refsource": "MLIST",
"url": "https://lists.apache.org/thread.html/rd336919f655b7ff309385e34a143e41c503e133da80414485b3abcc9@%3Ccvs.httpd.apache.org%3E"
},
{
"name": "[httpd-cvs] 20210606 svn commit: r1075470 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/json/CVE-2020-13938.json security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
"refsource": "MLIST",
"url": "https://lists.apache.org/thread.html/r76142b8c5119df2178be7c2dba88fde552eedeec37ea993dfce68d1d@%3Ccvs.httpd.apache.org%3E"
}
]
}
},
"nvd.nist.gov": {
"configurations": {
"CVE_data_version": "4.0",
"nodes": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:apache:http_server:2.4.23:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:http_server:2.4.12:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:http_server:2.4.10:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:http_server:2.4.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:http_server:2.4.16:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:http_server:2.4.14:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:http_server:2.4.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:http_server:2.4.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:http_server:2.4.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:http_server:2.4.22:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:http_server:2.4.21:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:http_server:2.4.9:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:http_server:2.4.8:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:http_server:2.4.20:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:http_server:2.4.19:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:http_server:2.4.7:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:http_server:2.4.6:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
}
]
},
"cve": {
"CVE_data_meta": {
"ASSIGNER": "security@apache.org",
"ID": "CVE-2016-2161"
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "en",
"value": "In Apache HTTP Server versions 2.4.0 to 2.4.23, malicious input to mod_auth_digest can cause the server to crash, and each instance continues to crash even for subsequently valid requests."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "en",
"value": "CWE-20"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2016-2161",
"refsource": "CONFIRM",
"tags": [
"Vendor Advisory"
],
"url": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2016-2161"
},
{
"name": "GLSA-201701-36",
"refsource": "GENTOO",
"tags": [
"Third Party Advisory"
],
"url": "https://security.gentoo.org/glsa/201701-36"
},
{
"name": "https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbux03725en_us",
"refsource": "CONFIRM",
"tags": [
"Third Party Advisory"
],
"url": "https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbux03725en_us"
},
{
"name": "1037508",
"refsource": "SECTRACK",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "http://www.securitytracker.com/id/1037508"
},
{
"name": "95076",
"refsource": "BID",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "http://www.securityfocus.com/bid/95076"
},
{
"name": "https://www.tenable.com/security/tns-2017-04",
"refsource": "CONFIRM",
"tags": [],
"url": "https://www.tenable.com/security/tns-2017-04"
},
{
"name": "DSA-3796",
"refsource": "DEBIAN",
"tags": [],
"url": "http://www.debian.org/security/2017/dsa-3796"
},
{
"name": "https://support.apple.com/HT208221",
"refsource": "CONFIRM",
"tags": [],
"url": "https://support.apple.com/HT208221"
},
{
"name": "RHSA-2017:1414",
"refsource": "REDHAT",
"tags": [],
"url": "https://access.redhat.com/errata/RHSA-2017:1414"
},
{
"name": "RHSA-2017:1413",
"refsource": "REDHAT",
"tags": [],
"url": "https://access.redhat.com/errata/RHSA-2017:1413"
},
{
"name": "RHSA-2017:1161",
"refsource": "REDHAT",
"tags": [],
"url": "https://access.redhat.com/errata/RHSA-2017:1161"
},
{
"name": "RHSA-2017:0906",
"refsource": "REDHAT",
"tags": [],
"url": "https://access.redhat.com/errata/RHSA-2017:0906"
},
{
"name": "RHSA-2017:1415",
"refsource": "REDHAT",
"tags": [],
"url": "http://rhn.redhat.com/errata/RHSA-2017-1415.html"
},
{
"name": "https://security.netapp.com/advisory/ntap-20180423-0001/",
"refsource": "CONFIRM",
"tags": [],
"url": "https://security.netapp.com/advisory/ntap-20180423-0001/"
},
{
"name": "[httpd-cvs] 20190815 svn commit: r1048743 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
"refsource": "MLIST",
"tags": [],
"url": "https://lists.apache.org/thread.html/56c2e7cc9deb1c12a843d0dc251ea7fd3e7e80293cde02fcd65286ba@%3Ccvs.httpd.apache.org%3E"
},
{
"name": "[httpd-cvs] 20190815 svn commit: r1048742 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
"refsource": "MLIST",
"tags": [],
"url": "https://lists.apache.org/thread.html/84a3714f0878781f6ed84473d1a503d2cc382277e100450209231830@%3Ccvs.httpd.apache.org%3E"
},
{
"name": "[httpd-cvs] 20200401 svn commit: r1058586 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
"refsource": "MLIST",
"tags": [],
"url": "https://lists.apache.org/thread.html/rd18c3c43602e66f9cdcf09f1de233804975b9572b0456cc582390b6f@%3Ccvs.httpd.apache.org%3E"
},
{
"name": "[httpd-cvs] 20200401 svn commit: r1058587 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
"refsource": "MLIST",
"tags": [],
"url": "https://lists.apache.org/thread.html/re3d27b6250aa8548b8845d314bb8a350b3df326cacbbfdfe4d455234@%3Ccvs.httpd.apache.org%3E"
},
{
"name": "[httpd-cvs] 20210330 svn commit: r1073140 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
"refsource": "MLIST",
"tags": [],
"url": "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E"
},
{
"name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
"refsource": "MLIST",
"tags": [],
"url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
},
{
"name": "[httpd-cvs] 20210330 svn commit: r1073139 [10/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
"refsource": "MLIST",
"tags": [],
"url": "https://lists.apache.org/thread.html/r04e89e873d54116a0635ef2f7061c15acc5ed27ef7500997beb65d6f@%3Ccvs.httpd.apache.org%3E"
},
{
"name": "[httpd-cvs] 20210330 svn commit: r1888194 [10/13] - /httpd/site/trunk/content/security/json/",
"refsource": "MLIST",
"tags": [],
"url": "https://lists.apache.org/thread.html/re1e3a24664d35bcd0a0e793e0b5fc6ca6c107f99a1b2c545c5d4b467@%3Ccvs.httpd.apache.org%3E"
},
{
"name": "[httpd-cvs] 20210330 svn commit: r1073149 [10/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
"refsource": "MLIST",
"tags": [],
"url": "https://lists.apache.org/thread.html/rb14daf9cc4e28d18cdc15d6a6ca74e565672fabf7ad89541071d008b@%3Ccvs.httpd.apache.org%3E"
},
{
"name": "[httpd-cvs] 20210330 svn commit: r1073149 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
"refsource": "MLIST",
"tags": [],
"url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E"
},
{
"name": "[httpd-cvs] 20210330 svn commit: r1073146 [3/3] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities-httpd.xml security/vulnerabilities_22.html security/vulnerabilities_24.html",
"refsource": "MLIST",
"tags": [],
"url": "https://lists.apache.org/thread.html/rcc44594d4d6579b90deccd4536b5d31f099ef563df39b094be286b9e@%3Ccvs.httpd.apache.org%3E"
},
{
"name": "[httpd-cvs] 20210603 svn commit: r1075360 [3/3] - in /websites/staging/httpd/trunk/content: ./ security/json/CVE-2021-31618.json security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
"refsource": "MLIST",
"tags": [],
"url": "https://lists.apache.org/thread.html/rd336919f655b7ff309385e34a143e41c503e133da80414485b3abcc9@%3Ccvs.httpd.apache.org%3E"
},
{
"name": "[httpd-cvs] 20210606 svn commit: r1075470 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/json/CVE-2020-13938.json security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
"refsource": "MLIST",
"tags": [],
"url": "https://lists.apache.org/thread.html/r76142b8c5119df2178be7c2dba88fde552eedeec37ea993dfce68d1d@%3Ccvs.httpd.apache.org%3E"
}
]
}
},
"impact": {
"baseMetricV2": {
"cvssV2": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5.0,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "MEDIUM",
"userInteractionRequired": false
},
"baseMetricV3": {
"cvssV3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
},
"lastModifiedDate": "2021-06-06T11:15Z",
"publishedDate": "2017-07-27T21:29Z"
}
}
}
RHSA-2017:0906
Vulnerability from csaf_redhat - Published: 2017-04-12 12:24 - Updated: 2026-05-14 22:23It was discovered that the mod_session_crypto module of httpd did not use any mechanisms to verify integrity of the encrypted session data stored in the user's browser. A remote attacker could use this flaw to decrypt and modify session data using a padding oracle attack.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 7Client-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Client-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Client-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Client-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Client-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Client-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Client-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Client-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Client-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Client-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Client-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Client-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Client-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Client-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Client-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Client-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Client-optional-7.3.Z:httpd-manual-0:2.4.6-45.el7_3.4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Client-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Client-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Client-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Client-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Client-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Client-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Client-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Client-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Client-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Client-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Client-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Client-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Client-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Client-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Client-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Client-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Client-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Client-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Client-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Client-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Client-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Client-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Client-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Client-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Client-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7ComputeNode-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7ComputeNode-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7ComputeNode-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7ComputeNode-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7ComputeNode-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7ComputeNode-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7ComputeNode-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7ComputeNode-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7ComputeNode-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7ComputeNode-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7ComputeNode-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7ComputeNode-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7ComputeNode-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7ComputeNode-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7ComputeNode-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7ComputeNode-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7ComputeNode-optional-7.3.Z:httpd-manual-0:2.4.6-45.el7_3.4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7ComputeNode-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7ComputeNode-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7ComputeNode-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7ComputeNode-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7ComputeNode-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7ComputeNode-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7ComputeNode-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7ComputeNode-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7ComputeNode-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7ComputeNode-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7ComputeNode-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7ComputeNode-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7ComputeNode-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7ComputeNode-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7ComputeNode-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7ComputeNode-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7ComputeNode-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7ComputeNode-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7ComputeNode-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7ComputeNode-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7ComputeNode-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7ComputeNode-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7ComputeNode-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7ComputeNode-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7ComputeNode-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-7.3.Z:httpd-0:2.4.6-45.el7_3.4.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-7.3.Z:httpd-0:2.4.6-45.el7_3.4.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-7.3.Z:httpd-0:2.4.6-45.el7_3.4.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-7.3.Z:httpd-0:2.4.6-45.el7_3.4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-7.3.Z:httpd-0:2.4.6-45.el7_3.4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-7.3.Z:httpd-0:2.4.6-45.el7_3.4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-7.3.Z:httpd-manual-0:2.4.6-45.el7_3.4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-optional-7.3.Z:httpd-manual-0:2.4.6-45.el7_3.4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Workstation-7.3.Z:httpd-0:2.4.6-45.el7_3.4.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Workstation-7.3.Z:httpd-0:2.4.6-45.el7_3.4.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Workstation-7.3.Z:httpd-0:2.4.6-45.el7_3.4.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Workstation-7.3.Z:httpd-0:2.4.6-45.el7_3.4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Workstation-7.3.Z:httpd-0:2.4.6-45.el7_3.4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Workstation-7.3.Z:httpd-0:2.4.6-45.el7_3.4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Workstation-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Workstation-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Workstation-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Workstation-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Workstation-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Workstation-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Workstation-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Workstation-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Workstation-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Workstation-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Workstation-7.3.Z:httpd-manual-0:2.4.6-45.el7_3.4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Workstation-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Workstation-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Workstation-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Workstation-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Workstation-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Workstation-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Workstation-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Workstation-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Workstation-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Workstation-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Workstation-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Workstation-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Workstation-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Workstation-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Workstation-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Workstation-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Workstation-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Workstation-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Workstation-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Workstation-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Workstation-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Workstation-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Workstation-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Workstation-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Workstation-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Workstation-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Workstation-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Workstation-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Workstation-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Workstation-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Workstation-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Workstation-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Workstation-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Workstation-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Workstation-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Workstation-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Workstation-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Workstation-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Workstation-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Workstation-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Workstation-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Workstation-optional-7.3.Z:httpd-manual-0:2.4.6-45.el7_3.4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Workstation-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Workstation-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Workstation-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Workstation-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Workstation-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Workstation-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Workstation-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Workstation-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Workstation-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Workstation-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Workstation-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Workstation-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Workstation-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Workstation-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Workstation-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Workstation-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Workstation-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Workstation-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Workstation-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Workstation-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Workstation-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Workstation-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Workstation-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Workstation-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Workstation-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.x86_64 | — |
Vendor Fix
fix
|
It was discovered that the mod_auth_digest module of httpd did not properly check for memory allocation failures. A remote attacker could use this flaw to cause httpd child processes to repeatedly crash if the server used HTTP digest authentication.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 7Client-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Client-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Client-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Client-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Client-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Client-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Client-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Client-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Client-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Client-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Client-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Client-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Client-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Client-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Client-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Client-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Client-optional-7.3.Z:httpd-manual-0:2.4.6-45.el7_3.4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Client-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Client-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Client-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Client-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Client-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Client-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Client-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Client-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Client-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Client-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Client-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Client-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Client-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Client-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Client-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Client-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Client-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Client-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Client-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Client-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Client-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Client-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Client-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Client-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Client-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7ComputeNode-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7ComputeNode-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7ComputeNode-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7ComputeNode-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7ComputeNode-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7ComputeNode-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7ComputeNode-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7ComputeNode-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7ComputeNode-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7ComputeNode-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7ComputeNode-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7ComputeNode-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7ComputeNode-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7ComputeNode-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7ComputeNode-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7ComputeNode-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7ComputeNode-optional-7.3.Z:httpd-manual-0:2.4.6-45.el7_3.4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7ComputeNode-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7ComputeNode-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7ComputeNode-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7ComputeNode-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7ComputeNode-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7ComputeNode-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7ComputeNode-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7ComputeNode-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7ComputeNode-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7ComputeNode-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7ComputeNode-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7ComputeNode-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7ComputeNode-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7ComputeNode-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7ComputeNode-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7ComputeNode-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7ComputeNode-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7ComputeNode-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7ComputeNode-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7ComputeNode-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7ComputeNode-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7ComputeNode-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7ComputeNode-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7ComputeNode-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7ComputeNode-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-7.3.Z:httpd-0:2.4.6-45.el7_3.4.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-7.3.Z:httpd-0:2.4.6-45.el7_3.4.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-7.3.Z:httpd-0:2.4.6-45.el7_3.4.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-7.3.Z:httpd-0:2.4.6-45.el7_3.4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-7.3.Z:httpd-0:2.4.6-45.el7_3.4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-7.3.Z:httpd-0:2.4.6-45.el7_3.4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-7.3.Z:httpd-manual-0:2.4.6-45.el7_3.4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-optional-7.3.Z:httpd-manual-0:2.4.6-45.el7_3.4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Workstation-7.3.Z:httpd-0:2.4.6-45.el7_3.4.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Workstation-7.3.Z:httpd-0:2.4.6-45.el7_3.4.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Workstation-7.3.Z:httpd-0:2.4.6-45.el7_3.4.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Workstation-7.3.Z:httpd-0:2.4.6-45.el7_3.4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Workstation-7.3.Z:httpd-0:2.4.6-45.el7_3.4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Workstation-7.3.Z:httpd-0:2.4.6-45.el7_3.4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Workstation-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Workstation-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Workstation-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Workstation-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Workstation-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Workstation-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Workstation-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Workstation-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Workstation-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Workstation-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Workstation-7.3.Z:httpd-manual-0:2.4.6-45.el7_3.4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Workstation-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Workstation-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Workstation-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Workstation-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Workstation-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Workstation-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Workstation-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Workstation-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Workstation-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Workstation-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Workstation-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Workstation-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Workstation-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Workstation-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Workstation-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Workstation-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Workstation-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Workstation-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Workstation-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Workstation-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Workstation-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Workstation-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Workstation-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Workstation-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Workstation-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Workstation-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Workstation-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Workstation-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Workstation-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Workstation-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Workstation-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Workstation-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Workstation-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Workstation-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Workstation-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Workstation-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Workstation-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Workstation-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Workstation-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Workstation-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Workstation-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Workstation-optional-7.3.Z:httpd-manual-0:2.4.6-45.el7_3.4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Workstation-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Workstation-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Workstation-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Workstation-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Workstation-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Workstation-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Workstation-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Workstation-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Workstation-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Workstation-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Workstation-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Workstation-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Workstation-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Workstation-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Workstation-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Workstation-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Workstation-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Workstation-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Workstation-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Workstation-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Workstation-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Workstation-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Workstation-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Workstation-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Workstation-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.x86_64 | — |
Vendor Fix
fix
|
It was found that Apache was vulnerable to a HTTP response splitting attack for sites which use mod_userdir. An attacker could use this flaw to inject CRLF characters into the HTTP header and could possibly gain access to secure data.
CWE-113 - Improper Neutralization of CRLF Sequences in HTTP Headers ('HTTP Request/Response Splitting')| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 7Client-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Client-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Client-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Client-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Client-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Client-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Client-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Client-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Client-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Client-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Client-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Client-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Client-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Client-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Client-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Client-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Client-optional-7.3.Z:httpd-manual-0:2.4.6-45.el7_3.4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Client-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Client-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Client-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Client-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Client-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Client-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Client-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Client-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Client-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Client-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Client-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Client-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Client-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Client-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Client-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Client-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Client-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Client-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Client-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Client-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Client-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Client-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Client-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Client-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Client-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7ComputeNode-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7ComputeNode-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7ComputeNode-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7ComputeNode-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7ComputeNode-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7ComputeNode-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7ComputeNode-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7ComputeNode-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7ComputeNode-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7ComputeNode-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7ComputeNode-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7ComputeNode-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7ComputeNode-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7ComputeNode-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7ComputeNode-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7ComputeNode-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7ComputeNode-optional-7.3.Z:httpd-manual-0:2.4.6-45.el7_3.4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7ComputeNode-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7ComputeNode-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7ComputeNode-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7ComputeNode-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7ComputeNode-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7ComputeNode-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7ComputeNode-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7ComputeNode-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7ComputeNode-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7ComputeNode-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7ComputeNode-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7ComputeNode-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7ComputeNode-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7ComputeNode-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7ComputeNode-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7ComputeNode-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7ComputeNode-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7ComputeNode-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7ComputeNode-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7ComputeNode-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7ComputeNode-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7ComputeNode-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7ComputeNode-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7ComputeNode-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7ComputeNode-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-7.3.Z:httpd-0:2.4.6-45.el7_3.4.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-7.3.Z:httpd-0:2.4.6-45.el7_3.4.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-7.3.Z:httpd-0:2.4.6-45.el7_3.4.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-7.3.Z:httpd-0:2.4.6-45.el7_3.4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-7.3.Z:httpd-0:2.4.6-45.el7_3.4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-7.3.Z:httpd-0:2.4.6-45.el7_3.4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-7.3.Z:httpd-manual-0:2.4.6-45.el7_3.4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-optional-7.3.Z:httpd-manual-0:2.4.6-45.el7_3.4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Workstation-7.3.Z:httpd-0:2.4.6-45.el7_3.4.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Workstation-7.3.Z:httpd-0:2.4.6-45.el7_3.4.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Workstation-7.3.Z:httpd-0:2.4.6-45.el7_3.4.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Workstation-7.3.Z:httpd-0:2.4.6-45.el7_3.4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Workstation-7.3.Z:httpd-0:2.4.6-45.el7_3.4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Workstation-7.3.Z:httpd-0:2.4.6-45.el7_3.4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Workstation-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Workstation-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Workstation-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Workstation-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Workstation-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Workstation-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Workstation-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Workstation-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Workstation-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Workstation-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Workstation-7.3.Z:httpd-manual-0:2.4.6-45.el7_3.4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Workstation-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Workstation-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Workstation-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Workstation-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Workstation-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Workstation-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Workstation-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Workstation-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Workstation-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Workstation-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Workstation-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Workstation-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Workstation-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Workstation-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Workstation-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Workstation-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Workstation-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Workstation-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Workstation-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Workstation-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Workstation-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Workstation-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Workstation-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Workstation-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Workstation-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Workstation-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Workstation-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Workstation-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Workstation-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Workstation-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Workstation-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Workstation-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Workstation-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Workstation-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Workstation-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Workstation-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Workstation-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Workstation-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Workstation-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Workstation-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Workstation-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Workstation-optional-7.3.Z:httpd-manual-0:2.4.6-45.el7_3.4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Workstation-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Workstation-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Workstation-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Workstation-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Workstation-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Workstation-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Workstation-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Workstation-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Workstation-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Workstation-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Workstation-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Workstation-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Workstation-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Workstation-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Workstation-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Workstation-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Workstation-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Workstation-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Workstation-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Workstation-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Workstation-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Workstation-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Workstation-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Workstation-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Workstation-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.x86_64 | — |
Vendor Fix
fix
|
It was discovered that the HTTP parser in httpd incorrectly allowed certain characters not permitted by the HTTP protocol specification to appear unencoded in HTTP request headers. If httpd was used in conjunction with a proxy or backend server that interpreted those characters differently, a remote attacker could possibly use this flaw to inject data into HTTP responses, resulting in proxy cache poisoning.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 7Client-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Client-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Client-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Client-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Client-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Client-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Client-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Client-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Client-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Client-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Client-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Client-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Client-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Client-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Client-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Client-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Client-optional-7.3.Z:httpd-manual-0:2.4.6-45.el7_3.4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Client-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Client-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Client-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Client-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Client-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Client-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Client-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Client-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Client-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Client-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Client-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Client-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Client-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Client-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Client-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Client-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Client-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Client-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Client-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Client-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Client-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Client-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Client-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Client-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Client-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7ComputeNode-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7ComputeNode-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7ComputeNode-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7ComputeNode-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7ComputeNode-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7ComputeNode-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7ComputeNode-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7ComputeNode-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7ComputeNode-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7ComputeNode-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7ComputeNode-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7ComputeNode-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7ComputeNode-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7ComputeNode-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7ComputeNode-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7ComputeNode-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7ComputeNode-optional-7.3.Z:httpd-manual-0:2.4.6-45.el7_3.4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7ComputeNode-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7ComputeNode-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7ComputeNode-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7ComputeNode-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7ComputeNode-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7ComputeNode-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7ComputeNode-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7ComputeNode-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7ComputeNode-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7ComputeNode-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7ComputeNode-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7ComputeNode-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7ComputeNode-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7ComputeNode-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7ComputeNode-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7ComputeNode-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7ComputeNode-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7ComputeNode-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7ComputeNode-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7ComputeNode-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7ComputeNode-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7ComputeNode-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7ComputeNode-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7ComputeNode-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7ComputeNode-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-7.3.Z:httpd-0:2.4.6-45.el7_3.4.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-7.3.Z:httpd-0:2.4.6-45.el7_3.4.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-7.3.Z:httpd-0:2.4.6-45.el7_3.4.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-7.3.Z:httpd-0:2.4.6-45.el7_3.4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-7.3.Z:httpd-0:2.4.6-45.el7_3.4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-7.3.Z:httpd-0:2.4.6-45.el7_3.4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-7.3.Z:httpd-manual-0:2.4.6-45.el7_3.4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-optional-7.3.Z:httpd-manual-0:2.4.6-45.el7_3.4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Workstation-7.3.Z:httpd-0:2.4.6-45.el7_3.4.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Workstation-7.3.Z:httpd-0:2.4.6-45.el7_3.4.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Workstation-7.3.Z:httpd-0:2.4.6-45.el7_3.4.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Workstation-7.3.Z:httpd-0:2.4.6-45.el7_3.4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Workstation-7.3.Z:httpd-0:2.4.6-45.el7_3.4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Workstation-7.3.Z:httpd-0:2.4.6-45.el7_3.4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Workstation-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Workstation-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Workstation-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Workstation-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Workstation-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Workstation-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Workstation-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Workstation-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Workstation-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Workstation-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Workstation-7.3.Z:httpd-manual-0:2.4.6-45.el7_3.4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Workstation-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Workstation-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Workstation-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Workstation-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Workstation-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Workstation-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Workstation-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Workstation-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Workstation-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Workstation-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Workstation-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Workstation-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Workstation-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Workstation-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Workstation-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Workstation-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Workstation-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Workstation-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Workstation-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Workstation-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Workstation-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Workstation-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Workstation-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Workstation-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Workstation-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Workstation-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Workstation-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Workstation-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Workstation-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Workstation-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Workstation-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Workstation-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Workstation-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Workstation-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Workstation-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Workstation-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Workstation-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Workstation-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Workstation-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Workstation-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Workstation-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Workstation-optional-7.3.Z:httpd-manual-0:2.4.6-45.el7_3.4.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Workstation-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Workstation-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Workstation-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Workstation-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Workstation-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Workstation-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Workstation-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Workstation-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Workstation-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Workstation-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Workstation-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Workstation-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Workstation-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Workstation-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Workstation-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Workstation-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Workstation-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Workstation-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Workstation-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Workstation-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Workstation-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Workstation-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Workstation-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Workstation-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Workstation-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.x86_64 | — |
Vendor Fix
fix
|
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for httpd is now available for Red Hat Enterprise Linux 7.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The httpd packages provide the Apache HTTP Server, a powerful, efficient, and extensible web server.\n\nSecurity Fix(es):\n\n* It was discovered that the mod_session_crypto module of httpd did not use any mechanisms to verify integrity of the encrypted session data stored in the user\u0027s browser. A remote attacker could use this flaw to decrypt and modify session data using a padding oracle attack. (CVE-2016-0736)\n\n* It was discovered that the mod_auth_digest module of httpd did not properly check for memory allocation failures. A remote attacker could use this flaw to cause httpd child processes to repeatedly crash if the server used HTTP digest authentication. (CVE-2016-2161)\n\n* It was discovered that the HTTP parser in httpd incorrectly allowed certain characters not permitted by the HTTP protocol specification to appear unencoded in HTTP request headers. If httpd was used in conjunction with a proxy or backend server that interpreted those characters differently, a remote attacker could possibly use this flaw to inject data into HTTP responses, resulting in proxy cache poisoning. (CVE-2016-8743)\n\nNote: The fix for the CVE-2016-8743 issue causes httpd to return \"400 Bad Request\" error to HTTP clients which do not strictly follow HTTP protocol specification. A newly introduced configuration directive \"HttpProtocolOptions Unsafe\" can be used to re-enable the old less strict parsing. However, such setting also re-introduces the CVE-2016-8743 issue.\n\nBug Fix(es):\n\n* When waking up child processes during a graceful restart, the httpd parent process could attempt to open more connections than necessary if a large number of child processes had been active prior to the restart. Consequently, a graceful restart could take a long time to complete. With this update, httpd has been fixed to limit the number of connections opened during a graceful restart to the number of active children, and the described problem no longer occurs. (BZ#1420002)\n\n* Previously, httpd running in a container returned the 500 HTTP status code (Internal Server Error) when a connection to a WebSocket server was closed. As a consequence, the httpd server failed to deliver the correct HTTP status and data to a client. With this update, httpd correctly handles all proxied requests to the WebSocket server, and the described problem no longer occurs. (BZ#1429947)\n\n* In a configuration using LDAP authentication with the mod_authnz_ldap module, the name set using the AuthLDAPBindDN directive was not correctly used to bind to the LDAP server for all queries. Consequently, authorization attempts failed. The LDAP modules have been fixed to ensure the configured name is correctly bound for LDAP queries, and authorization using LDAP no longer fails. (BZ#1420047)",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2017:0906",
"url": "https://access.redhat.com/errata/RHSA-2017:0906"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#moderate",
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "1406744",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1406744"
},
{
"category": "external",
"summary": "1406753",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1406753"
},
{
"category": "external",
"summary": "1406822",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1406822"
},
{
"category": "external",
"summary": "1420002",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1420002"
},
{
"category": "external",
"summary": "1420047",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1420047"
},
{
"category": "external",
"summary": "1429947",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1429947"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2017/rhsa-2017_0906.json"
}
],
"title": "Red Hat Security Advisory: httpd security and bug fix update",
"tracking": {
"current_release_date": "2026-05-14T22:23:28+00:00",
"generator": {
"date": "2026-05-14T22:23:28+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.8.0"
}
},
"id": "RHSA-2017:0906",
"initial_release_date": "2017-04-12T12:24:45+00:00",
"revision_history": [
{
"date": "2017-04-12T12:24:45+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2017-04-12T12:24:45+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-05-14T22:23:28+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Client Optional (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.3.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::client"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.3.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::computenode"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.3.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server Optional (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.3.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Workstation (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.3.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::workstation"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.3.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::workstation"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "httpd-debuginfo-0:2.4.6-45.el7_3.4.x86_64",
"product": {
"name": "httpd-debuginfo-0:2.4.6-45.el7_3.4.x86_64",
"product_id": "httpd-debuginfo-0:2.4.6-45.el7_3.4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-debuginfo@2.4.6-45.el7_3.4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "mod_ssl-1:2.4.6-45.el7_3.4.x86_64",
"product": {
"name": "mod_ssl-1:2.4.6-45.el7_3.4.x86_64",
"product_id": "mod_ssl-1:2.4.6-45.el7_3.4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_ssl@2.4.6-45.el7_3.4?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "httpd-tools-0:2.4.6-45.el7_3.4.x86_64",
"product": {
"name": "httpd-tools-0:2.4.6-45.el7_3.4.x86_64",
"product_id": "httpd-tools-0:2.4.6-45.el7_3.4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-tools@2.4.6-45.el7_3.4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "httpd-0:2.4.6-45.el7_3.4.x86_64",
"product": {
"name": "httpd-0:2.4.6-45.el7_3.4.x86_64",
"product_id": "httpd-0:2.4.6-45.el7_3.4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd@2.4.6-45.el7_3.4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "httpd-devel-0:2.4.6-45.el7_3.4.x86_64",
"product": {
"name": "httpd-devel-0:2.4.6-45.el7_3.4.x86_64",
"product_id": "httpd-devel-0:2.4.6-45.el7_3.4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-devel@2.4.6-45.el7_3.4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "mod_ldap-0:2.4.6-45.el7_3.4.x86_64",
"product": {
"name": "mod_ldap-0:2.4.6-45.el7_3.4.x86_64",
"product_id": "mod_ldap-0:2.4.6-45.el7_3.4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_ldap@2.4.6-45.el7_3.4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "mod_session-0:2.4.6-45.el7_3.4.x86_64",
"product": {
"name": "mod_session-0:2.4.6-45.el7_3.4.x86_64",
"product_id": "mod_session-0:2.4.6-45.el7_3.4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_session@2.4.6-45.el7_3.4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "mod_proxy_html-1:2.4.6-45.el7_3.4.x86_64",
"product": {
"name": "mod_proxy_html-1:2.4.6-45.el7_3.4.x86_64",
"product_id": "mod_proxy_html-1:2.4.6-45.el7_3.4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_proxy_html@2.4.6-45.el7_3.4?arch=x86_64\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "httpd-manual-0:2.4.6-45.el7_3.4.noarch",
"product": {
"name": "httpd-manual-0:2.4.6-45.el7_3.4.noarch",
"product_id": "httpd-manual-0:2.4.6-45.el7_3.4.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-manual@2.4.6-45.el7_3.4?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "httpd-0:2.4.6-45.el7_3.4.src",
"product": {
"name": "httpd-0:2.4.6-45.el7_3.4.src",
"product_id": "httpd-0:2.4.6-45.el7_3.4.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd@2.4.6-45.el7_3.4?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "httpd-debuginfo-0:2.4.6-45.el7_3.4.s390x",
"product": {
"name": "httpd-debuginfo-0:2.4.6-45.el7_3.4.s390x",
"product_id": "httpd-debuginfo-0:2.4.6-45.el7_3.4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-debuginfo@2.4.6-45.el7_3.4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "mod_ssl-1:2.4.6-45.el7_3.4.s390x",
"product": {
"name": "mod_ssl-1:2.4.6-45.el7_3.4.s390x",
"product_id": "mod_ssl-1:2.4.6-45.el7_3.4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_ssl@2.4.6-45.el7_3.4?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "httpd-tools-0:2.4.6-45.el7_3.4.s390x",
"product": {
"name": "httpd-tools-0:2.4.6-45.el7_3.4.s390x",
"product_id": "httpd-tools-0:2.4.6-45.el7_3.4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-tools@2.4.6-45.el7_3.4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "httpd-0:2.4.6-45.el7_3.4.s390x",
"product": {
"name": "httpd-0:2.4.6-45.el7_3.4.s390x",
"product_id": "httpd-0:2.4.6-45.el7_3.4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd@2.4.6-45.el7_3.4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "httpd-devel-0:2.4.6-45.el7_3.4.s390x",
"product": {
"name": "httpd-devel-0:2.4.6-45.el7_3.4.s390x",
"product_id": "httpd-devel-0:2.4.6-45.el7_3.4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-devel@2.4.6-45.el7_3.4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "mod_ldap-0:2.4.6-45.el7_3.4.s390x",
"product": {
"name": "mod_ldap-0:2.4.6-45.el7_3.4.s390x",
"product_id": "mod_ldap-0:2.4.6-45.el7_3.4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_ldap@2.4.6-45.el7_3.4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "mod_session-0:2.4.6-45.el7_3.4.s390x",
"product": {
"name": "mod_session-0:2.4.6-45.el7_3.4.s390x",
"product_id": "mod_session-0:2.4.6-45.el7_3.4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_session@2.4.6-45.el7_3.4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "mod_proxy_html-1:2.4.6-45.el7_3.4.s390x",
"product": {
"name": "mod_proxy_html-1:2.4.6-45.el7_3.4.s390x",
"product_id": "mod_proxy_html-1:2.4.6-45.el7_3.4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_proxy_html@2.4.6-45.el7_3.4?arch=s390x\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "httpd-debuginfo-0:2.4.6-45.el7_3.4.ppc64",
"product": {
"name": "httpd-debuginfo-0:2.4.6-45.el7_3.4.ppc64",
"product_id": "httpd-debuginfo-0:2.4.6-45.el7_3.4.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-debuginfo@2.4.6-45.el7_3.4?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "mod_ssl-1:2.4.6-45.el7_3.4.ppc64",
"product": {
"name": "mod_ssl-1:2.4.6-45.el7_3.4.ppc64",
"product_id": "mod_ssl-1:2.4.6-45.el7_3.4.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_ssl@2.4.6-45.el7_3.4?arch=ppc64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "httpd-tools-0:2.4.6-45.el7_3.4.ppc64",
"product": {
"name": "httpd-tools-0:2.4.6-45.el7_3.4.ppc64",
"product_id": "httpd-tools-0:2.4.6-45.el7_3.4.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-tools@2.4.6-45.el7_3.4?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "httpd-0:2.4.6-45.el7_3.4.ppc64",
"product": {
"name": "httpd-0:2.4.6-45.el7_3.4.ppc64",
"product_id": "httpd-0:2.4.6-45.el7_3.4.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd@2.4.6-45.el7_3.4?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "httpd-devel-0:2.4.6-45.el7_3.4.ppc64",
"product": {
"name": "httpd-devel-0:2.4.6-45.el7_3.4.ppc64",
"product_id": "httpd-devel-0:2.4.6-45.el7_3.4.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-devel@2.4.6-45.el7_3.4?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "mod_ldap-0:2.4.6-45.el7_3.4.ppc64",
"product": {
"name": "mod_ldap-0:2.4.6-45.el7_3.4.ppc64",
"product_id": "mod_ldap-0:2.4.6-45.el7_3.4.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_ldap@2.4.6-45.el7_3.4?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "mod_session-0:2.4.6-45.el7_3.4.ppc64",
"product": {
"name": "mod_session-0:2.4.6-45.el7_3.4.ppc64",
"product_id": "mod_session-0:2.4.6-45.el7_3.4.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_session@2.4.6-45.el7_3.4?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "mod_proxy_html-1:2.4.6-45.el7_3.4.ppc64",
"product": {
"name": "mod_proxy_html-1:2.4.6-45.el7_3.4.ppc64",
"product_id": "mod_proxy_html-1:2.4.6-45.el7_3.4.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_proxy_html@2.4.6-45.el7_3.4?arch=ppc64\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "ppc64"
},
{
"branches": [
{
"category": "product_version",
"name": "httpd-debuginfo-0:2.4.6-45.el7_3.4.ppc64le",
"product": {
"name": "httpd-debuginfo-0:2.4.6-45.el7_3.4.ppc64le",
"product_id": "httpd-debuginfo-0:2.4.6-45.el7_3.4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-debuginfo@2.4.6-45.el7_3.4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "mod_ssl-1:2.4.6-45.el7_3.4.ppc64le",
"product": {
"name": "mod_ssl-1:2.4.6-45.el7_3.4.ppc64le",
"product_id": "mod_ssl-1:2.4.6-45.el7_3.4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_ssl@2.4.6-45.el7_3.4?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "httpd-tools-0:2.4.6-45.el7_3.4.ppc64le",
"product": {
"name": "httpd-tools-0:2.4.6-45.el7_3.4.ppc64le",
"product_id": "httpd-tools-0:2.4.6-45.el7_3.4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-tools@2.4.6-45.el7_3.4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "httpd-0:2.4.6-45.el7_3.4.ppc64le",
"product": {
"name": "httpd-0:2.4.6-45.el7_3.4.ppc64le",
"product_id": "httpd-0:2.4.6-45.el7_3.4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd@2.4.6-45.el7_3.4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "httpd-devel-0:2.4.6-45.el7_3.4.ppc64le",
"product": {
"name": "httpd-devel-0:2.4.6-45.el7_3.4.ppc64le",
"product_id": "httpd-devel-0:2.4.6-45.el7_3.4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-devel@2.4.6-45.el7_3.4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "mod_ldap-0:2.4.6-45.el7_3.4.ppc64le",
"product": {
"name": "mod_ldap-0:2.4.6-45.el7_3.4.ppc64le",
"product_id": "mod_ldap-0:2.4.6-45.el7_3.4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_ldap@2.4.6-45.el7_3.4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "mod_session-0:2.4.6-45.el7_3.4.ppc64le",
"product": {
"name": "mod_session-0:2.4.6-45.el7_3.4.ppc64le",
"product_id": "mod_session-0:2.4.6-45.el7_3.4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_session@2.4.6-45.el7_3.4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "mod_proxy_html-1:2.4.6-45.el7_3.4.ppc64le",
"product": {
"name": "mod_proxy_html-1:2.4.6-45.el7_3.4.ppc64le",
"product_id": "mod_proxy_html-1:2.4.6-45.el7_3.4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_proxy_html@2.4.6-45.el7_3.4?arch=ppc64le\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "httpd-debuginfo-0:2.4.6-45.el7_3.4.aarch64",
"product": {
"name": "httpd-debuginfo-0:2.4.6-45.el7_3.4.aarch64",
"product_id": "httpd-debuginfo-0:2.4.6-45.el7_3.4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-debuginfo@2.4.6-45.el7_3.4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "mod_ssl-1:2.4.6-45.el7_3.4.aarch64",
"product": {
"name": "mod_ssl-1:2.4.6-45.el7_3.4.aarch64",
"product_id": "mod_ssl-1:2.4.6-45.el7_3.4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_ssl@2.4.6-45.el7_3.4?arch=aarch64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "httpd-tools-0:2.4.6-45.el7_3.4.aarch64",
"product": {
"name": "httpd-tools-0:2.4.6-45.el7_3.4.aarch64",
"product_id": "httpd-tools-0:2.4.6-45.el7_3.4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-tools@2.4.6-45.el7_3.4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "httpd-0:2.4.6-45.el7_3.4.aarch64",
"product": {
"name": "httpd-0:2.4.6-45.el7_3.4.aarch64",
"product_id": "httpd-0:2.4.6-45.el7_3.4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd@2.4.6-45.el7_3.4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "httpd-devel-0:2.4.6-45.el7_3.4.aarch64",
"product": {
"name": "httpd-devel-0:2.4.6-45.el7_3.4.aarch64",
"product_id": "httpd-devel-0:2.4.6-45.el7_3.4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-devel@2.4.6-45.el7_3.4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "mod_ldap-0:2.4.6-45.el7_3.4.aarch64",
"product": {
"name": "mod_ldap-0:2.4.6-45.el7_3.4.aarch64",
"product_id": "mod_ldap-0:2.4.6-45.el7_3.4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_ldap@2.4.6-45.el7_3.4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "mod_session-0:2.4.6-45.el7_3.4.aarch64",
"product": {
"name": "mod_session-0:2.4.6-45.el7_3.4.aarch64",
"product_id": "mod_session-0:2.4.6-45.el7_3.4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_session@2.4.6-45.el7_3.4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "mod_proxy_html-1:2.4.6-45.el7_3.4.aarch64",
"product": {
"name": "mod_proxy_html-1:2.4.6-45.el7_3.4.aarch64",
"product_id": "mod_proxy_html-1:2.4.6-45.el7_3.4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_proxy_html@2.4.6-45.el7_3.4?arch=aarch64\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "aarch64"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-0:2.4.6-45.el7_3.4.aarch64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.aarch64"
},
"product_reference": "httpd-0:2.4.6-45.el7_3.4.aarch64",
"relates_to_product_reference": "7Client-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-0:2.4.6-45.el7_3.4.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.ppc64"
},
"product_reference": "httpd-0:2.4.6-45.el7_3.4.ppc64",
"relates_to_product_reference": "7Client-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-0:2.4.6-45.el7_3.4.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.ppc64le"
},
"product_reference": "httpd-0:2.4.6-45.el7_3.4.ppc64le",
"relates_to_product_reference": "7Client-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-0:2.4.6-45.el7_3.4.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.s390x"
},
"product_reference": "httpd-0:2.4.6-45.el7_3.4.s390x",
"relates_to_product_reference": "7Client-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-0:2.4.6-45.el7_3.4.src as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.src"
},
"product_reference": "httpd-0:2.4.6-45.el7_3.4.src",
"relates_to_product_reference": "7Client-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-0:2.4.6-45.el7_3.4.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.x86_64"
},
"product_reference": "httpd-0:2.4.6-45.el7_3.4.x86_64",
"relates_to_product_reference": "7Client-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-debuginfo-0:2.4.6-45.el7_3.4.aarch64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.aarch64"
},
"product_reference": "httpd-debuginfo-0:2.4.6-45.el7_3.4.aarch64",
"relates_to_product_reference": "7Client-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-debuginfo-0:2.4.6-45.el7_3.4.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.ppc64"
},
"product_reference": "httpd-debuginfo-0:2.4.6-45.el7_3.4.ppc64",
"relates_to_product_reference": "7Client-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-debuginfo-0:2.4.6-45.el7_3.4.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.ppc64le"
},
"product_reference": "httpd-debuginfo-0:2.4.6-45.el7_3.4.ppc64le",
"relates_to_product_reference": "7Client-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-debuginfo-0:2.4.6-45.el7_3.4.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.s390x"
},
"product_reference": "httpd-debuginfo-0:2.4.6-45.el7_3.4.s390x",
"relates_to_product_reference": "7Client-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-debuginfo-0:2.4.6-45.el7_3.4.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.x86_64"
},
"product_reference": "httpd-debuginfo-0:2.4.6-45.el7_3.4.x86_64",
"relates_to_product_reference": "7Client-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-devel-0:2.4.6-45.el7_3.4.aarch64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.aarch64"
},
"product_reference": "httpd-devel-0:2.4.6-45.el7_3.4.aarch64",
"relates_to_product_reference": "7Client-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-devel-0:2.4.6-45.el7_3.4.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.ppc64"
},
"product_reference": "httpd-devel-0:2.4.6-45.el7_3.4.ppc64",
"relates_to_product_reference": "7Client-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-devel-0:2.4.6-45.el7_3.4.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.ppc64le"
},
"product_reference": "httpd-devel-0:2.4.6-45.el7_3.4.ppc64le",
"relates_to_product_reference": "7Client-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-devel-0:2.4.6-45.el7_3.4.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.s390x"
},
"product_reference": "httpd-devel-0:2.4.6-45.el7_3.4.s390x",
"relates_to_product_reference": "7Client-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-devel-0:2.4.6-45.el7_3.4.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.x86_64"
},
"product_reference": "httpd-devel-0:2.4.6-45.el7_3.4.x86_64",
"relates_to_product_reference": "7Client-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-manual-0:2.4.6-45.el7_3.4.noarch as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.3.Z:httpd-manual-0:2.4.6-45.el7_3.4.noarch"
},
"product_reference": "httpd-manual-0:2.4.6-45.el7_3.4.noarch",
"relates_to_product_reference": "7Client-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-tools-0:2.4.6-45.el7_3.4.aarch64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.aarch64"
},
"product_reference": "httpd-tools-0:2.4.6-45.el7_3.4.aarch64",
"relates_to_product_reference": "7Client-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-tools-0:2.4.6-45.el7_3.4.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.ppc64"
},
"product_reference": "httpd-tools-0:2.4.6-45.el7_3.4.ppc64",
"relates_to_product_reference": "7Client-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-tools-0:2.4.6-45.el7_3.4.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.ppc64le"
},
"product_reference": "httpd-tools-0:2.4.6-45.el7_3.4.ppc64le",
"relates_to_product_reference": "7Client-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-tools-0:2.4.6-45.el7_3.4.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.s390x"
},
"product_reference": "httpd-tools-0:2.4.6-45.el7_3.4.s390x",
"relates_to_product_reference": "7Client-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-tools-0:2.4.6-45.el7_3.4.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.x86_64"
},
"product_reference": "httpd-tools-0:2.4.6-45.el7_3.4.x86_64",
"relates_to_product_reference": "7Client-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_ldap-0:2.4.6-45.el7_3.4.aarch64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.aarch64"
},
"product_reference": "mod_ldap-0:2.4.6-45.el7_3.4.aarch64",
"relates_to_product_reference": "7Client-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_ldap-0:2.4.6-45.el7_3.4.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.ppc64"
},
"product_reference": "mod_ldap-0:2.4.6-45.el7_3.4.ppc64",
"relates_to_product_reference": "7Client-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_ldap-0:2.4.6-45.el7_3.4.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.ppc64le"
},
"product_reference": "mod_ldap-0:2.4.6-45.el7_3.4.ppc64le",
"relates_to_product_reference": "7Client-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_ldap-0:2.4.6-45.el7_3.4.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.s390x"
},
"product_reference": "mod_ldap-0:2.4.6-45.el7_3.4.s390x",
"relates_to_product_reference": "7Client-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_ldap-0:2.4.6-45.el7_3.4.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.x86_64"
},
"product_reference": "mod_ldap-0:2.4.6-45.el7_3.4.x86_64",
"relates_to_product_reference": "7Client-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_proxy_html-1:2.4.6-45.el7_3.4.aarch64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.aarch64"
},
"product_reference": "mod_proxy_html-1:2.4.6-45.el7_3.4.aarch64",
"relates_to_product_reference": "7Client-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_proxy_html-1:2.4.6-45.el7_3.4.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.ppc64"
},
"product_reference": "mod_proxy_html-1:2.4.6-45.el7_3.4.ppc64",
"relates_to_product_reference": "7Client-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_proxy_html-1:2.4.6-45.el7_3.4.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.ppc64le"
},
"product_reference": "mod_proxy_html-1:2.4.6-45.el7_3.4.ppc64le",
"relates_to_product_reference": "7Client-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_proxy_html-1:2.4.6-45.el7_3.4.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.s390x"
},
"product_reference": "mod_proxy_html-1:2.4.6-45.el7_3.4.s390x",
"relates_to_product_reference": "7Client-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_proxy_html-1:2.4.6-45.el7_3.4.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.x86_64"
},
"product_reference": "mod_proxy_html-1:2.4.6-45.el7_3.4.x86_64",
"relates_to_product_reference": "7Client-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_session-0:2.4.6-45.el7_3.4.aarch64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.aarch64"
},
"product_reference": "mod_session-0:2.4.6-45.el7_3.4.aarch64",
"relates_to_product_reference": "7Client-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_session-0:2.4.6-45.el7_3.4.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.ppc64"
},
"product_reference": "mod_session-0:2.4.6-45.el7_3.4.ppc64",
"relates_to_product_reference": "7Client-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_session-0:2.4.6-45.el7_3.4.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.ppc64le"
},
"product_reference": "mod_session-0:2.4.6-45.el7_3.4.ppc64le",
"relates_to_product_reference": "7Client-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_session-0:2.4.6-45.el7_3.4.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.s390x"
},
"product_reference": "mod_session-0:2.4.6-45.el7_3.4.s390x",
"relates_to_product_reference": "7Client-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_session-0:2.4.6-45.el7_3.4.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.x86_64"
},
"product_reference": "mod_session-0:2.4.6-45.el7_3.4.x86_64",
"relates_to_product_reference": "7Client-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_ssl-1:2.4.6-45.el7_3.4.aarch64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.aarch64"
},
"product_reference": "mod_ssl-1:2.4.6-45.el7_3.4.aarch64",
"relates_to_product_reference": "7Client-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_ssl-1:2.4.6-45.el7_3.4.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.ppc64"
},
"product_reference": "mod_ssl-1:2.4.6-45.el7_3.4.ppc64",
"relates_to_product_reference": "7Client-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_ssl-1:2.4.6-45.el7_3.4.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.ppc64le"
},
"product_reference": "mod_ssl-1:2.4.6-45.el7_3.4.ppc64le",
"relates_to_product_reference": "7Client-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_ssl-1:2.4.6-45.el7_3.4.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.s390x"
},
"product_reference": "mod_ssl-1:2.4.6-45.el7_3.4.s390x",
"relates_to_product_reference": "7Client-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_ssl-1:2.4.6-45.el7_3.4.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.x86_64"
},
"product_reference": "mod_ssl-1:2.4.6-45.el7_3.4.x86_64",
"relates_to_product_reference": "7Client-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-0:2.4.6-45.el7_3.4.aarch64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.aarch64"
},
"product_reference": "httpd-0:2.4.6-45.el7_3.4.aarch64",
"relates_to_product_reference": "7ComputeNode-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-0:2.4.6-45.el7_3.4.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.ppc64"
},
"product_reference": "httpd-0:2.4.6-45.el7_3.4.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-0:2.4.6-45.el7_3.4.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.ppc64le"
},
"product_reference": "httpd-0:2.4.6-45.el7_3.4.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-0:2.4.6-45.el7_3.4.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.s390x"
},
"product_reference": "httpd-0:2.4.6-45.el7_3.4.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-0:2.4.6-45.el7_3.4.src as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.src"
},
"product_reference": "httpd-0:2.4.6-45.el7_3.4.src",
"relates_to_product_reference": "7ComputeNode-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-0:2.4.6-45.el7_3.4.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.x86_64"
},
"product_reference": "httpd-0:2.4.6-45.el7_3.4.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-debuginfo-0:2.4.6-45.el7_3.4.aarch64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.aarch64"
},
"product_reference": "httpd-debuginfo-0:2.4.6-45.el7_3.4.aarch64",
"relates_to_product_reference": "7ComputeNode-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-debuginfo-0:2.4.6-45.el7_3.4.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.ppc64"
},
"product_reference": "httpd-debuginfo-0:2.4.6-45.el7_3.4.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-debuginfo-0:2.4.6-45.el7_3.4.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.ppc64le"
},
"product_reference": "httpd-debuginfo-0:2.4.6-45.el7_3.4.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-debuginfo-0:2.4.6-45.el7_3.4.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.s390x"
},
"product_reference": "httpd-debuginfo-0:2.4.6-45.el7_3.4.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-debuginfo-0:2.4.6-45.el7_3.4.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.x86_64"
},
"product_reference": "httpd-debuginfo-0:2.4.6-45.el7_3.4.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-devel-0:2.4.6-45.el7_3.4.aarch64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.aarch64"
},
"product_reference": "httpd-devel-0:2.4.6-45.el7_3.4.aarch64",
"relates_to_product_reference": "7ComputeNode-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-devel-0:2.4.6-45.el7_3.4.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.ppc64"
},
"product_reference": "httpd-devel-0:2.4.6-45.el7_3.4.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-devel-0:2.4.6-45.el7_3.4.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.ppc64le"
},
"product_reference": "httpd-devel-0:2.4.6-45.el7_3.4.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-devel-0:2.4.6-45.el7_3.4.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.s390x"
},
"product_reference": "httpd-devel-0:2.4.6-45.el7_3.4.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-devel-0:2.4.6-45.el7_3.4.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.x86_64"
},
"product_reference": "httpd-devel-0:2.4.6-45.el7_3.4.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-manual-0:2.4.6-45.el7_3.4.noarch as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.3.Z:httpd-manual-0:2.4.6-45.el7_3.4.noarch"
},
"product_reference": "httpd-manual-0:2.4.6-45.el7_3.4.noarch",
"relates_to_product_reference": "7ComputeNode-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-tools-0:2.4.6-45.el7_3.4.aarch64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.aarch64"
},
"product_reference": "httpd-tools-0:2.4.6-45.el7_3.4.aarch64",
"relates_to_product_reference": "7ComputeNode-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-tools-0:2.4.6-45.el7_3.4.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.ppc64"
},
"product_reference": "httpd-tools-0:2.4.6-45.el7_3.4.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-tools-0:2.4.6-45.el7_3.4.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.ppc64le"
},
"product_reference": "httpd-tools-0:2.4.6-45.el7_3.4.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-tools-0:2.4.6-45.el7_3.4.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.s390x"
},
"product_reference": "httpd-tools-0:2.4.6-45.el7_3.4.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-tools-0:2.4.6-45.el7_3.4.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.x86_64"
},
"product_reference": "httpd-tools-0:2.4.6-45.el7_3.4.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_ldap-0:2.4.6-45.el7_3.4.aarch64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.aarch64"
},
"product_reference": "mod_ldap-0:2.4.6-45.el7_3.4.aarch64",
"relates_to_product_reference": "7ComputeNode-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_ldap-0:2.4.6-45.el7_3.4.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.ppc64"
},
"product_reference": "mod_ldap-0:2.4.6-45.el7_3.4.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_ldap-0:2.4.6-45.el7_3.4.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.ppc64le"
},
"product_reference": "mod_ldap-0:2.4.6-45.el7_3.4.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_ldap-0:2.4.6-45.el7_3.4.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.s390x"
},
"product_reference": "mod_ldap-0:2.4.6-45.el7_3.4.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_ldap-0:2.4.6-45.el7_3.4.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.x86_64"
},
"product_reference": "mod_ldap-0:2.4.6-45.el7_3.4.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_proxy_html-1:2.4.6-45.el7_3.4.aarch64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.aarch64"
},
"product_reference": "mod_proxy_html-1:2.4.6-45.el7_3.4.aarch64",
"relates_to_product_reference": "7ComputeNode-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_proxy_html-1:2.4.6-45.el7_3.4.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.ppc64"
},
"product_reference": "mod_proxy_html-1:2.4.6-45.el7_3.4.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_proxy_html-1:2.4.6-45.el7_3.4.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.ppc64le"
},
"product_reference": "mod_proxy_html-1:2.4.6-45.el7_3.4.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_proxy_html-1:2.4.6-45.el7_3.4.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.s390x"
},
"product_reference": "mod_proxy_html-1:2.4.6-45.el7_3.4.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_proxy_html-1:2.4.6-45.el7_3.4.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.x86_64"
},
"product_reference": "mod_proxy_html-1:2.4.6-45.el7_3.4.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_session-0:2.4.6-45.el7_3.4.aarch64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.aarch64"
},
"product_reference": "mod_session-0:2.4.6-45.el7_3.4.aarch64",
"relates_to_product_reference": "7ComputeNode-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_session-0:2.4.6-45.el7_3.4.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.ppc64"
},
"product_reference": "mod_session-0:2.4.6-45.el7_3.4.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_session-0:2.4.6-45.el7_3.4.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.ppc64le"
},
"product_reference": "mod_session-0:2.4.6-45.el7_3.4.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_session-0:2.4.6-45.el7_3.4.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.s390x"
},
"product_reference": "mod_session-0:2.4.6-45.el7_3.4.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_session-0:2.4.6-45.el7_3.4.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.x86_64"
},
"product_reference": "mod_session-0:2.4.6-45.el7_3.4.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_ssl-1:2.4.6-45.el7_3.4.aarch64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.aarch64"
},
"product_reference": "mod_ssl-1:2.4.6-45.el7_3.4.aarch64",
"relates_to_product_reference": "7ComputeNode-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_ssl-1:2.4.6-45.el7_3.4.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.ppc64"
},
"product_reference": "mod_ssl-1:2.4.6-45.el7_3.4.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_ssl-1:2.4.6-45.el7_3.4.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.ppc64le"
},
"product_reference": "mod_ssl-1:2.4.6-45.el7_3.4.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_ssl-1:2.4.6-45.el7_3.4.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.s390x"
},
"product_reference": "mod_ssl-1:2.4.6-45.el7_3.4.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_ssl-1:2.4.6-45.el7_3.4.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.x86_64"
},
"product_reference": "mod_ssl-1:2.4.6-45.el7_3.4.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-0:2.4.6-45.el7_3.4.aarch64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.3.Z:httpd-0:2.4.6-45.el7_3.4.aarch64"
},
"product_reference": "httpd-0:2.4.6-45.el7_3.4.aarch64",
"relates_to_product_reference": "7Server-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-0:2.4.6-45.el7_3.4.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.3.Z:httpd-0:2.4.6-45.el7_3.4.ppc64"
},
"product_reference": "httpd-0:2.4.6-45.el7_3.4.ppc64",
"relates_to_product_reference": "7Server-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-0:2.4.6-45.el7_3.4.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.3.Z:httpd-0:2.4.6-45.el7_3.4.ppc64le"
},
"product_reference": "httpd-0:2.4.6-45.el7_3.4.ppc64le",
"relates_to_product_reference": "7Server-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-0:2.4.6-45.el7_3.4.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.3.Z:httpd-0:2.4.6-45.el7_3.4.s390x"
},
"product_reference": "httpd-0:2.4.6-45.el7_3.4.s390x",
"relates_to_product_reference": "7Server-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-0:2.4.6-45.el7_3.4.src as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.3.Z:httpd-0:2.4.6-45.el7_3.4.src"
},
"product_reference": "httpd-0:2.4.6-45.el7_3.4.src",
"relates_to_product_reference": "7Server-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-0:2.4.6-45.el7_3.4.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.3.Z:httpd-0:2.4.6-45.el7_3.4.x86_64"
},
"product_reference": "httpd-0:2.4.6-45.el7_3.4.x86_64",
"relates_to_product_reference": "7Server-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-debuginfo-0:2.4.6-45.el7_3.4.aarch64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.aarch64"
},
"product_reference": "httpd-debuginfo-0:2.4.6-45.el7_3.4.aarch64",
"relates_to_product_reference": "7Server-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-debuginfo-0:2.4.6-45.el7_3.4.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.ppc64"
},
"product_reference": "httpd-debuginfo-0:2.4.6-45.el7_3.4.ppc64",
"relates_to_product_reference": "7Server-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-debuginfo-0:2.4.6-45.el7_3.4.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.ppc64le"
},
"product_reference": "httpd-debuginfo-0:2.4.6-45.el7_3.4.ppc64le",
"relates_to_product_reference": "7Server-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-debuginfo-0:2.4.6-45.el7_3.4.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.s390x"
},
"product_reference": "httpd-debuginfo-0:2.4.6-45.el7_3.4.s390x",
"relates_to_product_reference": "7Server-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-debuginfo-0:2.4.6-45.el7_3.4.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.x86_64"
},
"product_reference": "httpd-debuginfo-0:2.4.6-45.el7_3.4.x86_64",
"relates_to_product_reference": "7Server-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-devel-0:2.4.6-45.el7_3.4.aarch64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.aarch64"
},
"product_reference": "httpd-devel-0:2.4.6-45.el7_3.4.aarch64",
"relates_to_product_reference": "7Server-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-devel-0:2.4.6-45.el7_3.4.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.ppc64"
},
"product_reference": "httpd-devel-0:2.4.6-45.el7_3.4.ppc64",
"relates_to_product_reference": "7Server-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-devel-0:2.4.6-45.el7_3.4.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.ppc64le"
},
"product_reference": "httpd-devel-0:2.4.6-45.el7_3.4.ppc64le",
"relates_to_product_reference": "7Server-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-devel-0:2.4.6-45.el7_3.4.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.s390x"
},
"product_reference": "httpd-devel-0:2.4.6-45.el7_3.4.s390x",
"relates_to_product_reference": "7Server-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-devel-0:2.4.6-45.el7_3.4.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.x86_64"
},
"product_reference": "httpd-devel-0:2.4.6-45.el7_3.4.x86_64",
"relates_to_product_reference": "7Server-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-manual-0:2.4.6-45.el7_3.4.noarch as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.3.Z:httpd-manual-0:2.4.6-45.el7_3.4.noarch"
},
"product_reference": "httpd-manual-0:2.4.6-45.el7_3.4.noarch",
"relates_to_product_reference": "7Server-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-tools-0:2.4.6-45.el7_3.4.aarch64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.aarch64"
},
"product_reference": "httpd-tools-0:2.4.6-45.el7_3.4.aarch64",
"relates_to_product_reference": "7Server-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-tools-0:2.4.6-45.el7_3.4.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.ppc64"
},
"product_reference": "httpd-tools-0:2.4.6-45.el7_3.4.ppc64",
"relates_to_product_reference": "7Server-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-tools-0:2.4.6-45.el7_3.4.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.ppc64le"
},
"product_reference": "httpd-tools-0:2.4.6-45.el7_3.4.ppc64le",
"relates_to_product_reference": "7Server-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-tools-0:2.4.6-45.el7_3.4.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.s390x"
},
"product_reference": "httpd-tools-0:2.4.6-45.el7_3.4.s390x",
"relates_to_product_reference": "7Server-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-tools-0:2.4.6-45.el7_3.4.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.x86_64"
},
"product_reference": "httpd-tools-0:2.4.6-45.el7_3.4.x86_64",
"relates_to_product_reference": "7Server-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_ldap-0:2.4.6-45.el7_3.4.aarch64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.aarch64"
},
"product_reference": "mod_ldap-0:2.4.6-45.el7_3.4.aarch64",
"relates_to_product_reference": "7Server-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_ldap-0:2.4.6-45.el7_3.4.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.ppc64"
},
"product_reference": "mod_ldap-0:2.4.6-45.el7_3.4.ppc64",
"relates_to_product_reference": "7Server-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_ldap-0:2.4.6-45.el7_3.4.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.ppc64le"
},
"product_reference": "mod_ldap-0:2.4.6-45.el7_3.4.ppc64le",
"relates_to_product_reference": "7Server-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_ldap-0:2.4.6-45.el7_3.4.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.s390x"
},
"product_reference": "mod_ldap-0:2.4.6-45.el7_3.4.s390x",
"relates_to_product_reference": "7Server-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_ldap-0:2.4.6-45.el7_3.4.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.x86_64"
},
"product_reference": "mod_ldap-0:2.4.6-45.el7_3.4.x86_64",
"relates_to_product_reference": "7Server-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_proxy_html-1:2.4.6-45.el7_3.4.aarch64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.aarch64"
},
"product_reference": "mod_proxy_html-1:2.4.6-45.el7_3.4.aarch64",
"relates_to_product_reference": "7Server-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_proxy_html-1:2.4.6-45.el7_3.4.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.ppc64"
},
"product_reference": "mod_proxy_html-1:2.4.6-45.el7_3.4.ppc64",
"relates_to_product_reference": "7Server-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_proxy_html-1:2.4.6-45.el7_3.4.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.ppc64le"
},
"product_reference": "mod_proxy_html-1:2.4.6-45.el7_3.4.ppc64le",
"relates_to_product_reference": "7Server-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_proxy_html-1:2.4.6-45.el7_3.4.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.s390x"
},
"product_reference": "mod_proxy_html-1:2.4.6-45.el7_3.4.s390x",
"relates_to_product_reference": "7Server-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_proxy_html-1:2.4.6-45.el7_3.4.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.x86_64"
},
"product_reference": "mod_proxy_html-1:2.4.6-45.el7_3.4.x86_64",
"relates_to_product_reference": "7Server-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_session-0:2.4.6-45.el7_3.4.aarch64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.aarch64"
},
"product_reference": "mod_session-0:2.4.6-45.el7_3.4.aarch64",
"relates_to_product_reference": "7Server-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_session-0:2.4.6-45.el7_3.4.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.ppc64"
},
"product_reference": "mod_session-0:2.4.6-45.el7_3.4.ppc64",
"relates_to_product_reference": "7Server-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_session-0:2.4.6-45.el7_3.4.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.ppc64le"
},
"product_reference": "mod_session-0:2.4.6-45.el7_3.4.ppc64le",
"relates_to_product_reference": "7Server-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_session-0:2.4.6-45.el7_3.4.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.s390x"
},
"product_reference": "mod_session-0:2.4.6-45.el7_3.4.s390x",
"relates_to_product_reference": "7Server-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_session-0:2.4.6-45.el7_3.4.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.x86_64"
},
"product_reference": "mod_session-0:2.4.6-45.el7_3.4.x86_64",
"relates_to_product_reference": "7Server-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_ssl-1:2.4.6-45.el7_3.4.aarch64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.aarch64"
},
"product_reference": "mod_ssl-1:2.4.6-45.el7_3.4.aarch64",
"relates_to_product_reference": "7Server-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_ssl-1:2.4.6-45.el7_3.4.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.ppc64"
},
"product_reference": "mod_ssl-1:2.4.6-45.el7_3.4.ppc64",
"relates_to_product_reference": "7Server-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_ssl-1:2.4.6-45.el7_3.4.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.ppc64le"
},
"product_reference": "mod_ssl-1:2.4.6-45.el7_3.4.ppc64le",
"relates_to_product_reference": "7Server-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_ssl-1:2.4.6-45.el7_3.4.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.s390x"
},
"product_reference": "mod_ssl-1:2.4.6-45.el7_3.4.s390x",
"relates_to_product_reference": "7Server-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_ssl-1:2.4.6-45.el7_3.4.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.x86_64"
},
"product_reference": "mod_ssl-1:2.4.6-45.el7_3.4.x86_64",
"relates_to_product_reference": "7Server-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-0:2.4.6-45.el7_3.4.aarch64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.aarch64"
},
"product_reference": "httpd-0:2.4.6-45.el7_3.4.aarch64",
"relates_to_product_reference": "7Server-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-0:2.4.6-45.el7_3.4.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.ppc64"
},
"product_reference": "httpd-0:2.4.6-45.el7_3.4.ppc64",
"relates_to_product_reference": "7Server-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-0:2.4.6-45.el7_3.4.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.ppc64le"
},
"product_reference": "httpd-0:2.4.6-45.el7_3.4.ppc64le",
"relates_to_product_reference": "7Server-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-0:2.4.6-45.el7_3.4.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.s390x"
},
"product_reference": "httpd-0:2.4.6-45.el7_3.4.s390x",
"relates_to_product_reference": "7Server-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-0:2.4.6-45.el7_3.4.src as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.src"
},
"product_reference": "httpd-0:2.4.6-45.el7_3.4.src",
"relates_to_product_reference": "7Server-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-0:2.4.6-45.el7_3.4.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.x86_64"
},
"product_reference": "httpd-0:2.4.6-45.el7_3.4.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-debuginfo-0:2.4.6-45.el7_3.4.aarch64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.aarch64"
},
"product_reference": "httpd-debuginfo-0:2.4.6-45.el7_3.4.aarch64",
"relates_to_product_reference": "7Server-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-debuginfo-0:2.4.6-45.el7_3.4.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.ppc64"
},
"product_reference": "httpd-debuginfo-0:2.4.6-45.el7_3.4.ppc64",
"relates_to_product_reference": "7Server-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-debuginfo-0:2.4.6-45.el7_3.4.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.ppc64le"
},
"product_reference": "httpd-debuginfo-0:2.4.6-45.el7_3.4.ppc64le",
"relates_to_product_reference": "7Server-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-debuginfo-0:2.4.6-45.el7_3.4.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.s390x"
},
"product_reference": "httpd-debuginfo-0:2.4.6-45.el7_3.4.s390x",
"relates_to_product_reference": "7Server-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-debuginfo-0:2.4.6-45.el7_3.4.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.x86_64"
},
"product_reference": "httpd-debuginfo-0:2.4.6-45.el7_3.4.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-devel-0:2.4.6-45.el7_3.4.aarch64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.aarch64"
},
"product_reference": "httpd-devel-0:2.4.6-45.el7_3.4.aarch64",
"relates_to_product_reference": "7Server-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-devel-0:2.4.6-45.el7_3.4.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.ppc64"
},
"product_reference": "httpd-devel-0:2.4.6-45.el7_3.4.ppc64",
"relates_to_product_reference": "7Server-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-devel-0:2.4.6-45.el7_3.4.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.ppc64le"
},
"product_reference": "httpd-devel-0:2.4.6-45.el7_3.4.ppc64le",
"relates_to_product_reference": "7Server-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-devel-0:2.4.6-45.el7_3.4.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.s390x"
},
"product_reference": "httpd-devel-0:2.4.6-45.el7_3.4.s390x",
"relates_to_product_reference": "7Server-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-devel-0:2.4.6-45.el7_3.4.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.x86_64"
},
"product_reference": "httpd-devel-0:2.4.6-45.el7_3.4.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-manual-0:2.4.6-45.el7_3.4.noarch as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.3.Z:httpd-manual-0:2.4.6-45.el7_3.4.noarch"
},
"product_reference": "httpd-manual-0:2.4.6-45.el7_3.4.noarch",
"relates_to_product_reference": "7Server-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-tools-0:2.4.6-45.el7_3.4.aarch64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.aarch64"
},
"product_reference": "httpd-tools-0:2.4.6-45.el7_3.4.aarch64",
"relates_to_product_reference": "7Server-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-tools-0:2.4.6-45.el7_3.4.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.ppc64"
},
"product_reference": "httpd-tools-0:2.4.6-45.el7_3.4.ppc64",
"relates_to_product_reference": "7Server-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-tools-0:2.4.6-45.el7_3.4.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.ppc64le"
},
"product_reference": "httpd-tools-0:2.4.6-45.el7_3.4.ppc64le",
"relates_to_product_reference": "7Server-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-tools-0:2.4.6-45.el7_3.4.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.s390x"
},
"product_reference": "httpd-tools-0:2.4.6-45.el7_3.4.s390x",
"relates_to_product_reference": "7Server-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-tools-0:2.4.6-45.el7_3.4.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.x86_64"
},
"product_reference": "httpd-tools-0:2.4.6-45.el7_3.4.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_ldap-0:2.4.6-45.el7_3.4.aarch64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.aarch64"
},
"product_reference": "mod_ldap-0:2.4.6-45.el7_3.4.aarch64",
"relates_to_product_reference": "7Server-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_ldap-0:2.4.6-45.el7_3.4.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.ppc64"
},
"product_reference": "mod_ldap-0:2.4.6-45.el7_3.4.ppc64",
"relates_to_product_reference": "7Server-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_ldap-0:2.4.6-45.el7_3.4.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.ppc64le"
},
"product_reference": "mod_ldap-0:2.4.6-45.el7_3.4.ppc64le",
"relates_to_product_reference": "7Server-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_ldap-0:2.4.6-45.el7_3.4.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.s390x"
},
"product_reference": "mod_ldap-0:2.4.6-45.el7_3.4.s390x",
"relates_to_product_reference": "7Server-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_ldap-0:2.4.6-45.el7_3.4.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.x86_64"
},
"product_reference": "mod_ldap-0:2.4.6-45.el7_3.4.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_proxy_html-1:2.4.6-45.el7_3.4.aarch64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.aarch64"
},
"product_reference": "mod_proxy_html-1:2.4.6-45.el7_3.4.aarch64",
"relates_to_product_reference": "7Server-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_proxy_html-1:2.4.6-45.el7_3.4.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.ppc64"
},
"product_reference": "mod_proxy_html-1:2.4.6-45.el7_3.4.ppc64",
"relates_to_product_reference": "7Server-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_proxy_html-1:2.4.6-45.el7_3.4.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.ppc64le"
},
"product_reference": "mod_proxy_html-1:2.4.6-45.el7_3.4.ppc64le",
"relates_to_product_reference": "7Server-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_proxy_html-1:2.4.6-45.el7_3.4.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.s390x"
},
"product_reference": "mod_proxy_html-1:2.4.6-45.el7_3.4.s390x",
"relates_to_product_reference": "7Server-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_proxy_html-1:2.4.6-45.el7_3.4.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.x86_64"
},
"product_reference": "mod_proxy_html-1:2.4.6-45.el7_3.4.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_session-0:2.4.6-45.el7_3.4.aarch64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.aarch64"
},
"product_reference": "mod_session-0:2.4.6-45.el7_3.4.aarch64",
"relates_to_product_reference": "7Server-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_session-0:2.4.6-45.el7_3.4.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.ppc64"
},
"product_reference": "mod_session-0:2.4.6-45.el7_3.4.ppc64",
"relates_to_product_reference": "7Server-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_session-0:2.4.6-45.el7_3.4.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.ppc64le"
},
"product_reference": "mod_session-0:2.4.6-45.el7_3.4.ppc64le",
"relates_to_product_reference": "7Server-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_session-0:2.4.6-45.el7_3.4.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.s390x"
},
"product_reference": "mod_session-0:2.4.6-45.el7_3.4.s390x",
"relates_to_product_reference": "7Server-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_session-0:2.4.6-45.el7_3.4.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.x86_64"
},
"product_reference": "mod_session-0:2.4.6-45.el7_3.4.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_ssl-1:2.4.6-45.el7_3.4.aarch64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.aarch64"
},
"product_reference": "mod_ssl-1:2.4.6-45.el7_3.4.aarch64",
"relates_to_product_reference": "7Server-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_ssl-1:2.4.6-45.el7_3.4.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.ppc64"
},
"product_reference": "mod_ssl-1:2.4.6-45.el7_3.4.ppc64",
"relates_to_product_reference": "7Server-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_ssl-1:2.4.6-45.el7_3.4.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.ppc64le"
},
"product_reference": "mod_ssl-1:2.4.6-45.el7_3.4.ppc64le",
"relates_to_product_reference": "7Server-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_ssl-1:2.4.6-45.el7_3.4.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.s390x"
},
"product_reference": "mod_ssl-1:2.4.6-45.el7_3.4.s390x",
"relates_to_product_reference": "7Server-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_ssl-1:2.4.6-45.el7_3.4.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.x86_64"
},
"product_reference": "mod_ssl-1:2.4.6-45.el7_3.4.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-0:2.4.6-45.el7_3.4.aarch64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.3.Z:httpd-0:2.4.6-45.el7_3.4.aarch64"
},
"product_reference": "httpd-0:2.4.6-45.el7_3.4.aarch64",
"relates_to_product_reference": "7Workstation-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-0:2.4.6-45.el7_3.4.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.3.Z:httpd-0:2.4.6-45.el7_3.4.ppc64"
},
"product_reference": "httpd-0:2.4.6-45.el7_3.4.ppc64",
"relates_to_product_reference": "7Workstation-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-0:2.4.6-45.el7_3.4.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.3.Z:httpd-0:2.4.6-45.el7_3.4.ppc64le"
},
"product_reference": "httpd-0:2.4.6-45.el7_3.4.ppc64le",
"relates_to_product_reference": "7Workstation-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-0:2.4.6-45.el7_3.4.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.3.Z:httpd-0:2.4.6-45.el7_3.4.s390x"
},
"product_reference": "httpd-0:2.4.6-45.el7_3.4.s390x",
"relates_to_product_reference": "7Workstation-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-0:2.4.6-45.el7_3.4.src as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.3.Z:httpd-0:2.4.6-45.el7_3.4.src"
},
"product_reference": "httpd-0:2.4.6-45.el7_3.4.src",
"relates_to_product_reference": "7Workstation-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-0:2.4.6-45.el7_3.4.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.3.Z:httpd-0:2.4.6-45.el7_3.4.x86_64"
},
"product_reference": "httpd-0:2.4.6-45.el7_3.4.x86_64",
"relates_to_product_reference": "7Workstation-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-debuginfo-0:2.4.6-45.el7_3.4.aarch64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.aarch64"
},
"product_reference": "httpd-debuginfo-0:2.4.6-45.el7_3.4.aarch64",
"relates_to_product_reference": "7Workstation-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-debuginfo-0:2.4.6-45.el7_3.4.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.ppc64"
},
"product_reference": "httpd-debuginfo-0:2.4.6-45.el7_3.4.ppc64",
"relates_to_product_reference": "7Workstation-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-debuginfo-0:2.4.6-45.el7_3.4.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.ppc64le"
},
"product_reference": "httpd-debuginfo-0:2.4.6-45.el7_3.4.ppc64le",
"relates_to_product_reference": "7Workstation-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-debuginfo-0:2.4.6-45.el7_3.4.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.s390x"
},
"product_reference": "httpd-debuginfo-0:2.4.6-45.el7_3.4.s390x",
"relates_to_product_reference": "7Workstation-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-debuginfo-0:2.4.6-45.el7_3.4.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.x86_64"
},
"product_reference": "httpd-debuginfo-0:2.4.6-45.el7_3.4.x86_64",
"relates_to_product_reference": "7Workstation-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-devel-0:2.4.6-45.el7_3.4.aarch64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.aarch64"
},
"product_reference": "httpd-devel-0:2.4.6-45.el7_3.4.aarch64",
"relates_to_product_reference": "7Workstation-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-devel-0:2.4.6-45.el7_3.4.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.ppc64"
},
"product_reference": "httpd-devel-0:2.4.6-45.el7_3.4.ppc64",
"relates_to_product_reference": "7Workstation-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-devel-0:2.4.6-45.el7_3.4.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.ppc64le"
},
"product_reference": "httpd-devel-0:2.4.6-45.el7_3.4.ppc64le",
"relates_to_product_reference": "7Workstation-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-devel-0:2.4.6-45.el7_3.4.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.s390x"
},
"product_reference": "httpd-devel-0:2.4.6-45.el7_3.4.s390x",
"relates_to_product_reference": "7Workstation-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-devel-0:2.4.6-45.el7_3.4.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.x86_64"
},
"product_reference": "httpd-devel-0:2.4.6-45.el7_3.4.x86_64",
"relates_to_product_reference": "7Workstation-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-manual-0:2.4.6-45.el7_3.4.noarch as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.3.Z:httpd-manual-0:2.4.6-45.el7_3.4.noarch"
},
"product_reference": "httpd-manual-0:2.4.6-45.el7_3.4.noarch",
"relates_to_product_reference": "7Workstation-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-tools-0:2.4.6-45.el7_3.4.aarch64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.aarch64"
},
"product_reference": "httpd-tools-0:2.4.6-45.el7_3.4.aarch64",
"relates_to_product_reference": "7Workstation-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-tools-0:2.4.6-45.el7_3.4.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.ppc64"
},
"product_reference": "httpd-tools-0:2.4.6-45.el7_3.4.ppc64",
"relates_to_product_reference": "7Workstation-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-tools-0:2.4.6-45.el7_3.4.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.ppc64le"
},
"product_reference": "httpd-tools-0:2.4.6-45.el7_3.4.ppc64le",
"relates_to_product_reference": "7Workstation-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-tools-0:2.4.6-45.el7_3.4.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.s390x"
},
"product_reference": "httpd-tools-0:2.4.6-45.el7_3.4.s390x",
"relates_to_product_reference": "7Workstation-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-tools-0:2.4.6-45.el7_3.4.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.x86_64"
},
"product_reference": "httpd-tools-0:2.4.6-45.el7_3.4.x86_64",
"relates_to_product_reference": "7Workstation-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_ldap-0:2.4.6-45.el7_3.4.aarch64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.aarch64"
},
"product_reference": "mod_ldap-0:2.4.6-45.el7_3.4.aarch64",
"relates_to_product_reference": "7Workstation-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_ldap-0:2.4.6-45.el7_3.4.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.ppc64"
},
"product_reference": "mod_ldap-0:2.4.6-45.el7_3.4.ppc64",
"relates_to_product_reference": "7Workstation-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_ldap-0:2.4.6-45.el7_3.4.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.ppc64le"
},
"product_reference": "mod_ldap-0:2.4.6-45.el7_3.4.ppc64le",
"relates_to_product_reference": "7Workstation-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_ldap-0:2.4.6-45.el7_3.4.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.s390x"
},
"product_reference": "mod_ldap-0:2.4.6-45.el7_3.4.s390x",
"relates_to_product_reference": "7Workstation-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_ldap-0:2.4.6-45.el7_3.4.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.x86_64"
},
"product_reference": "mod_ldap-0:2.4.6-45.el7_3.4.x86_64",
"relates_to_product_reference": "7Workstation-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_proxy_html-1:2.4.6-45.el7_3.4.aarch64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.aarch64"
},
"product_reference": "mod_proxy_html-1:2.4.6-45.el7_3.4.aarch64",
"relates_to_product_reference": "7Workstation-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_proxy_html-1:2.4.6-45.el7_3.4.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.ppc64"
},
"product_reference": "mod_proxy_html-1:2.4.6-45.el7_3.4.ppc64",
"relates_to_product_reference": "7Workstation-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_proxy_html-1:2.4.6-45.el7_3.4.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.ppc64le"
},
"product_reference": "mod_proxy_html-1:2.4.6-45.el7_3.4.ppc64le",
"relates_to_product_reference": "7Workstation-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_proxy_html-1:2.4.6-45.el7_3.4.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.s390x"
},
"product_reference": "mod_proxy_html-1:2.4.6-45.el7_3.4.s390x",
"relates_to_product_reference": "7Workstation-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_proxy_html-1:2.4.6-45.el7_3.4.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.x86_64"
},
"product_reference": "mod_proxy_html-1:2.4.6-45.el7_3.4.x86_64",
"relates_to_product_reference": "7Workstation-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_session-0:2.4.6-45.el7_3.4.aarch64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.aarch64"
},
"product_reference": "mod_session-0:2.4.6-45.el7_3.4.aarch64",
"relates_to_product_reference": "7Workstation-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_session-0:2.4.6-45.el7_3.4.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.ppc64"
},
"product_reference": "mod_session-0:2.4.6-45.el7_3.4.ppc64",
"relates_to_product_reference": "7Workstation-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_session-0:2.4.6-45.el7_3.4.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.ppc64le"
},
"product_reference": "mod_session-0:2.4.6-45.el7_3.4.ppc64le",
"relates_to_product_reference": "7Workstation-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_session-0:2.4.6-45.el7_3.4.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.s390x"
},
"product_reference": "mod_session-0:2.4.6-45.el7_3.4.s390x",
"relates_to_product_reference": "7Workstation-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_session-0:2.4.6-45.el7_3.4.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.x86_64"
},
"product_reference": "mod_session-0:2.4.6-45.el7_3.4.x86_64",
"relates_to_product_reference": "7Workstation-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_ssl-1:2.4.6-45.el7_3.4.aarch64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.aarch64"
},
"product_reference": "mod_ssl-1:2.4.6-45.el7_3.4.aarch64",
"relates_to_product_reference": "7Workstation-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_ssl-1:2.4.6-45.el7_3.4.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.ppc64"
},
"product_reference": "mod_ssl-1:2.4.6-45.el7_3.4.ppc64",
"relates_to_product_reference": "7Workstation-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_ssl-1:2.4.6-45.el7_3.4.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.ppc64le"
},
"product_reference": "mod_ssl-1:2.4.6-45.el7_3.4.ppc64le",
"relates_to_product_reference": "7Workstation-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_ssl-1:2.4.6-45.el7_3.4.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.s390x"
},
"product_reference": "mod_ssl-1:2.4.6-45.el7_3.4.s390x",
"relates_to_product_reference": "7Workstation-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_ssl-1:2.4.6-45.el7_3.4.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.x86_64"
},
"product_reference": "mod_ssl-1:2.4.6-45.el7_3.4.x86_64",
"relates_to_product_reference": "7Workstation-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-0:2.4.6-45.el7_3.4.aarch64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.aarch64"
},
"product_reference": "httpd-0:2.4.6-45.el7_3.4.aarch64",
"relates_to_product_reference": "7Workstation-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-0:2.4.6-45.el7_3.4.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.ppc64"
},
"product_reference": "httpd-0:2.4.6-45.el7_3.4.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-0:2.4.6-45.el7_3.4.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.ppc64le"
},
"product_reference": "httpd-0:2.4.6-45.el7_3.4.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-0:2.4.6-45.el7_3.4.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.s390x"
},
"product_reference": "httpd-0:2.4.6-45.el7_3.4.s390x",
"relates_to_product_reference": "7Workstation-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-0:2.4.6-45.el7_3.4.src as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.src"
},
"product_reference": "httpd-0:2.4.6-45.el7_3.4.src",
"relates_to_product_reference": "7Workstation-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-0:2.4.6-45.el7_3.4.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.x86_64"
},
"product_reference": "httpd-0:2.4.6-45.el7_3.4.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-debuginfo-0:2.4.6-45.el7_3.4.aarch64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.aarch64"
},
"product_reference": "httpd-debuginfo-0:2.4.6-45.el7_3.4.aarch64",
"relates_to_product_reference": "7Workstation-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-debuginfo-0:2.4.6-45.el7_3.4.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.ppc64"
},
"product_reference": "httpd-debuginfo-0:2.4.6-45.el7_3.4.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-debuginfo-0:2.4.6-45.el7_3.4.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.ppc64le"
},
"product_reference": "httpd-debuginfo-0:2.4.6-45.el7_3.4.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-debuginfo-0:2.4.6-45.el7_3.4.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.s390x"
},
"product_reference": "httpd-debuginfo-0:2.4.6-45.el7_3.4.s390x",
"relates_to_product_reference": "7Workstation-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-debuginfo-0:2.4.6-45.el7_3.4.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.x86_64"
},
"product_reference": "httpd-debuginfo-0:2.4.6-45.el7_3.4.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-devel-0:2.4.6-45.el7_3.4.aarch64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.aarch64"
},
"product_reference": "httpd-devel-0:2.4.6-45.el7_3.4.aarch64",
"relates_to_product_reference": "7Workstation-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-devel-0:2.4.6-45.el7_3.4.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.ppc64"
},
"product_reference": "httpd-devel-0:2.4.6-45.el7_3.4.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-devel-0:2.4.6-45.el7_3.4.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.ppc64le"
},
"product_reference": "httpd-devel-0:2.4.6-45.el7_3.4.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-devel-0:2.4.6-45.el7_3.4.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.s390x"
},
"product_reference": "httpd-devel-0:2.4.6-45.el7_3.4.s390x",
"relates_to_product_reference": "7Workstation-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-devel-0:2.4.6-45.el7_3.4.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.x86_64"
},
"product_reference": "httpd-devel-0:2.4.6-45.el7_3.4.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-manual-0:2.4.6-45.el7_3.4.noarch as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.3.Z:httpd-manual-0:2.4.6-45.el7_3.4.noarch"
},
"product_reference": "httpd-manual-0:2.4.6-45.el7_3.4.noarch",
"relates_to_product_reference": "7Workstation-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-tools-0:2.4.6-45.el7_3.4.aarch64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.aarch64"
},
"product_reference": "httpd-tools-0:2.4.6-45.el7_3.4.aarch64",
"relates_to_product_reference": "7Workstation-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-tools-0:2.4.6-45.el7_3.4.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.ppc64"
},
"product_reference": "httpd-tools-0:2.4.6-45.el7_3.4.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-tools-0:2.4.6-45.el7_3.4.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.ppc64le"
},
"product_reference": "httpd-tools-0:2.4.6-45.el7_3.4.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-tools-0:2.4.6-45.el7_3.4.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.s390x"
},
"product_reference": "httpd-tools-0:2.4.6-45.el7_3.4.s390x",
"relates_to_product_reference": "7Workstation-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-tools-0:2.4.6-45.el7_3.4.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.x86_64"
},
"product_reference": "httpd-tools-0:2.4.6-45.el7_3.4.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_ldap-0:2.4.6-45.el7_3.4.aarch64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.aarch64"
},
"product_reference": "mod_ldap-0:2.4.6-45.el7_3.4.aarch64",
"relates_to_product_reference": "7Workstation-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_ldap-0:2.4.6-45.el7_3.4.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.ppc64"
},
"product_reference": "mod_ldap-0:2.4.6-45.el7_3.4.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_ldap-0:2.4.6-45.el7_3.4.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.ppc64le"
},
"product_reference": "mod_ldap-0:2.4.6-45.el7_3.4.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_ldap-0:2.4.6-45.el7_3.4.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.s390x"
},
"product_reference": "mod_ldap-0:2.4.6-45.el7_3.4.s390x",
"relates_to_product_reference": "7Workstation-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_ldap-0:2.4.6-45.el7_3.4.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.x86_64"
},
"product_reference": "mod_ldap-0:2.4.6-45.el7_3.4.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_proxy_html-1:2.4.6-45.el7_3.4.aarch64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.aarch64"
},
"product_reference": "mod_proxy_html-1:2.4.6-45.el7_3.4.aarch64",
"relates_to_product_reference": "7Workstation-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_proxy_html-1:2.4.6-45.el7_3.4.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.ppc64"
},
"product_reference": "mod_proxy_html-1:2.4.6-45.el7_3.4.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_proxy_html-1:2.4.6-45.el7_3.4.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.ppc64le"
},
"product_reference": "mod_proxy_html-1:2.4.6-45.el7_3.4.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_proxy_html-1:2.4.6-45.el7_3.4.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.s390x"
},
"product_reference": "mod_proxy_html-1:2.4.6-45.el7_3.4.s390x",
"relates_to_product_reference": "7Workstation-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_proxy_html-1:2.4.6-45.el7_3.4.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.x86_64"
},
"product_reference": "mod_proxy_html-1:2.4.6-45.el7_3.4.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_session-0:2.4.6-45.el7_3.4.aarch64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.aarch64"
},
"product_reference": "mod_session-0:2.4.6-45.el7_3.4.aarch64",
"relates_to_product_reference": "7Workstation-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_session-0:2.4.6-45.el7_3.4.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.ppc64"
},
"product_reference": "mod_session-0:2.4.6-45.el7_3.4.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_session-0:2.4.6-45.el7_3.4.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.ppc64le"
},
"product_reference": "mod_session-0:2.4.6-45.el7_3.4.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_session-0:2.4.6-45.el7_3.4.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.s390x"
},
"product_reference": "mod_session-0:2.4.6-45.el7_3.4.s390x",
"relates_to_product_reference": "7Workstation-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_session-0:2.4.6-45.el7_3.4.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.x86_64"
},
"product_reference": "mod_session-0:2.4.6-45.el7_3.4.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_ssl-1:2.4.6-45.el7_3.4.aarch64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.aarch64"
},
"product_reference": "mod_ssl-1:2.4.6-45.el7_3.4.aarch64",
"relates_to_product_reference": "7Workstation-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_ssl-1:2.4.6-45.el7_3.4.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.ppc64"
},
"product_reference": "mod_ssl-1:2.4.6-45.el7_3.4.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_ssl-1:2.4.6-45.el7_3.4.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.ppc64le"
},
"product_reference": "mod_ssl-1:2.4.6-45.el7_3.4.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_ssl-1:2.4.6-45.el7_3.4.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.s390x"
},
"product_reference": "mod_ssl-1:2.4.6-45.el7_3.4.s390x",
"relates_to_product_reference": "7Workstation-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_ssl-1:2.4.6-45.el7_3.4.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.x86_64"
},
"product_reference": "mod_ssl-1:2.4.6-45.el7_3.4.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.3.Z"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2016-0736",
"cwe": {
"id": "CWE-287",
"name": "Improper Authentication"
},
"discovery_date": "2016-12-20T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1406744"
}
],
"notes": [
{
"category": "description",
"text": "It was discovered that the mod_session_crypto module of httpd did not use any mechanisms to verify integrity of the encrypted session data stored in the user\u0027s browser. A remote attacker could use this flaw to decrypt and modify session data using a padding oracle attack.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "httpd: Padding Oracle in Apache mod_session_crypto",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Client-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.aarch64",
"7Client-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.ppc64",
"7Client-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.ppc64le",
"7Client-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.s390x",
"7Client-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.src",
"7Client-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.x86_64",
"7Client-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.aarch64",
"7Client-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.ppc64",
"7Client-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.ppc64le",
"7Client-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.s390x",
"7Client-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.x86_64",
"7Client-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.aarch64",
"7Client-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.ppc64",
"7Client-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.ppc64le",
"7Client-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.s390x",
"7Client-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.x86_64",
"7Client-optional-7.3.Z:httpd-manual-0:2.4.6-45.el7_3.4.noarch",
"7Client-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.aarch64",
"7Client-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.ppc64",
"7Client-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.ppc64le",
"7Client-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.s390x",
"7Client-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.x86_64",
"7Client-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.aarch64",
"7Client-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.ppc64",
"7Client-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.ppc64le",
"7Client-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.s390x",
"7Client-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.x86_64",
"7Client-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.aarch64",
"7Client-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.ppc64",
"7Client-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.ppc64le",
"7Client-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.s390x",
"7Client-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.x86_64",
"7Client-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.aarch64",
"7Client-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.ppc64",
"7Client-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.ppc64le",
"7Client-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.s390x",
"7Client-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.x86_64",
"7Client-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.aarch64",
"7Client-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.ppc64",
"7Client-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.ppc64le",
"7Client-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.s390x",
"7Client-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.x86_64",
"7ComputeNode-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.aarch64",
"7ComputeNode-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.ppc64",
"7ComputeNode-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.ppc64le",
"7ComputeNode-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.s390x",
"7ComputeNode-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.src",
"7ComputeNode-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.x86_64",
"7ComputeNode-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.aarch64",
"7ComputeNode-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.ppc64",
"7ComputeNode-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.ppc64le",
"7ComputeNode-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.s390x",
"7ComputeNode-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.x86_64",
"7ComputeNode-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.aarch64",
"7ComputeNode-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.ppc64",
"7ComputeNode-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.ppc64le",
"7ComputeNode-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.s390x",
"7ComputeNode-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.x86_64",
"7ComputeNode-optional-7.3.Z:httpd-manual-0:2.4.6-45.el7_3.4.noarch",
"7ComputeNode-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.aarch64",
"7ComputeNode-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.ppc64",
"7ComputeNode-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.ppc64le",
"7ComputeNode-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.s390x",
"7ComputeNode-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.x86_64",
"7ComputeNode-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.aarch64",
"7ComputeNode-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.ppc64",
"7ComputeNode-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.ppc64le",
"7ComputeNode-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.s390x",
"7ComputeNode-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.x86_64",
"7ComputeNode-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.aarch64",
"7ComputeNode-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.ppc64",
"7ComputeNode-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.ppc64le",
"7ComputeNode-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.s390x",
"7ComputeNode-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.x86_64",
"7ComputeNode-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.aarch64",
"7ComputeNode-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.ppc64",
"7ComputeNode-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.ppc64le",
"7ComputeNode-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.s390x",
"7ComputeNode-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.x86_64",
"7ComputeNode-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.aarch64",
"7ComputeNode-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.ppc64",
"7ComputeNode-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.ppc64le",
"7ComputeNode-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.s390x",
"7ComputeNode-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.x86_64",
"7Server-7.3.Z:httpd-0:2.4.6-45.el7_3.4.aarch64",
"7Server-7.3.Z:httpd-0:2.4.6-45.el7_3.4.ppc64",
"7Server-7.3.Z:httpd-0:2.4.6-45.el7_3.4.ppc64le",
"7Server-7.3.Z:httpd-0:2.4.6-45.el7_3.4.s390x",
"7Server-7.3.Z:httpd-0:2.4.6-45.el7_3.4.src",
"7Server-7.3.Z:httpd-0:2.4.6-45.el7_3.4.x86_64",
"7Server-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.aarch64",
"7Server-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.ppc64",
"7Server-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.ppc64le",
"7Server-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.s390x",
"7Server-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.x86_64",
"7Server-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.aarch64",
"7Server-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.ppc64",
"7Server-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.ppc64le",
"7Server-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.s390x",
"7Server-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.x86_64",
"7Server-7.3.Z:httpd-manual-0:2.4.6-45.el7_3.4.noarch",
"7Server-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.aarch64",
"7Server-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.ppc64",
"7Server-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.ppc64le",
"7Server-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.s390x",
"7Server-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.x86_64",
"7Server-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.aarch64",
"7Server-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.ppc64",
"7Server-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.ppc64le",
"7Server-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.s390x",
"7Server-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.x86_64",
"7Server-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.aarch64",
"7Server-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.ppc64",
"7Server-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.ppc64le",
"7Server-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.s390x",
"7Server-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.x86_64",
"7Server-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.aarch64",
"7Server-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.ppc64",
"7Server-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.ppc64le",
"7Server-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.s390x",
"7Server-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.x86_64",
"7Server-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.aarch64",
"7Server-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.ppc64",
"7Server-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.ppc64le",
"7Server-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.s390x",
"7Server-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.x86_64",
"7Server-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.aarch64",
"7Server-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.ppc64",
"7Server-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.ppc64le",
"7Server-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.s390x",
"7Server-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.src",
"7Server-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.x86_64",
"7Server-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.aarch64",
"7Server-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.ppc64",
"7Server-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.ppc64le",
"7Server-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.s390x",
"7Server-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.x86_64",
"7Server-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.aarch64",
"7Server-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.ppc64",
"7Server-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.ppc64le",
"7Server-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.s390x",
"7Server-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.x86_64",
"7Server-optional-7.3.Z:httpd-manual-0:2.4.6-45.el7_3.4.noarch",
"7Server-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.aarch64",
"7Server-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.ppc64",
"7Server-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.ppc64le",
"7Server-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.s390x",
"7Server-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.x86_64",
"7Server-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.aarch64",
"7Server-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.ppc64",
"7Server-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.ppc64le",
"7Server-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.s390x",
"7Server-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.x86_64",
"7Server-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.aarch64",
"7Server-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.ppc64",
"7Server-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.ppc64le",
"7Server-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.s390x",
"7Server-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.x86_64",
"7Server-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.aarch64",
"7Server-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.ppc64",
"7Server-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.ppc64le",
"7Server-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.s390x",
"7Server-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.x86_64",
"7Server-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.aarch64",
"7Server-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.ppc64",
"7Server-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.ppc64le",
"7Server-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.s390x",
"7Server-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.x86_64",
"7Workstation-7.3.Z:httpd-0:2.4.6-45.el7_3.4.aarch64",
"7Workstation-7.3.Z:httpd-0:2.4.6-45.el7_3.4.ppc64",
"7Workstation-7.3.Z:httpd-0:2.4.6-45.el7_3.4.ppc64le",
"7Workstation-7.3.Z:httpd-0:2.4.6-45.el7_3.4.s390x",
"7Workstation-7.3.Z:httpd-0:2.4.6-45.el7_3.4.src",
"7Workstation-7.3.Z:httpd-0:2.4.6-45.el7_3.4.x86_64",
"7Workstation-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.aarch64",
"7Workstation-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.ppc64",
"7Workstation-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.ppc64le",
"7Workstation-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.s390x",
"7Workstation-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.x86_64",
"7Workstation-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.aarch64",
"7Workstation-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.ppc64",
"7Workstation-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.ppc64le",
"7Workstation-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.s390x",
"7Workstation-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.x86_64",
"7Workstation-7.3.Z:httpd-manual-0:2.4.6-45.el7_3.4.noarch",
"7Workstation-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.aarch64",
"7Workstation-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.ppc64",
"7Workstation-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.ppc64le",
"7Workstation-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.s390x",
"7Workstation-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.x86_64",
"7Workstation-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.aarch64",
"7Workstation-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.ppc64",
"7Workstation-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.ppc64le",
"7Workstation-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.s390x",
"7Workstation-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.x86_64",
"7Workstation-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.aarch64",
"7Workstation-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.ppc64",
"7Workstation-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.ppc64le",
"7Workstation-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.s390x",
"7Workstation-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.x86_64",
"7Workstation-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.aarch64",
"7Workstation-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.ppc64",
"7Workstation-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.ppc64le",
"7Workstation-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.s390x",
"7Workstation-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.x86_64",
"7Workstation-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.aarch64",
"7Workstation-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.ppc64",
"7Workstation-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.ppc64le",
"7Workstation-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.s390x",
"7Workstation-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.x86_64",
"7Workstation-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.aarch64",
"7Workstation-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.ppc64",
"7Workstation-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.ppc64le",
"7Workstation-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.s390x",
"7Workstation-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.src",
"7Workstation-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.x86_64",
"7Workstation-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.aarch64",
"7Workstation-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.ppc64",
"7Workstation-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.ppc64le",
"7Workstation-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.s390x",
"7Workstation-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.x86_64",
"7Workstation-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.aarch64",
"7Workstation-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.ppc64",
"7Workstation-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.ppc64le",
"7Workstation-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.s390x",
"7Workstation-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.x86_64",
"7Workstation-optional-7.3.Z:httpd-manual-0:2.4.6-45.el7_3.4.noarch",
"7Workstation-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.aarch64",
"7Workstation-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.ppc64",
"7Workstation-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.ppc64le",
"7Workstation-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.s390x",
"7Workstation-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.x86_64",
"7Workstation-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.aarch64",
"7Workstation-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.ppc64",
"7Workstation-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.ppc64le",
"7Workstation-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.s390x",
"7Workstation-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.x86_64",
"7Workstation-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.aarch64",
"7Workstation-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.ppc64",
"7Workstation-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.ppc64le",
"7Workstation-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.s390x",
"7Workstation-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.x86_64",
"7Workstation-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.aarch64",
"7Workstation-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.ppc64",
"7Workstation-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.ppc64le",
"7Workstation-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.s390x",
"7Workstation-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.x86_64",
"7Workstation-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.aarch64",
"7Workstation-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.ppc64",
"7Workstation-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.ppc64le",
"7Workstation-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.s390x",
"7Workstation-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2016-0736"
},
{
"category": "external",
"summary": "RHBZ#1406744",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1406744"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2016-0736",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-0736"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-0736",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2016-0736"
},
{
"category": "external",
"summary": "https://httpd.apache.org/security/vulnerabilities_24.html#2.4.25",
"url": "https://httpd.apache.org/security/vulnerabilities_24.html#2.4.25"
},
{
"category": "external",
"summary": "https://www.redteam-pentesting.de/advisories/rt-sa-2016-001.txt",
"url": "https://www.redteam-pentesting.de/advisories/rt-sa-2016-001.txt"
}
],
"release_date": "2016-12-20T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2017-04-12T12:24:45+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically.",
"product_ids": [
"7Client-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.aarch64",
"7Client-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.ppc64",
"7Client-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.ppc64le",
"7Client-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.s390x",
"7Client-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.src",
"7Client-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.x86_64",
"7Client-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.aarch64",
"7Client-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.ppc64",
"7Client-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.ppc64le",
"7Client-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.s390x",
"7Client-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.x86_64",
"7Client-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.aarch64",
"7Client-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.ppc64",
"7Client-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.ppc64le",
"7Client-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.s390x",
"7Client-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.x86_64",
"7Client-optional-7.3.Z:httpd-manual-0:2.4.6-45.el7_3.4.noarch",
"7Client-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.aarch64",
"7Client-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.ppc64",
"7Client-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.ppc64le",
"7Client-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.s390x",
"7Client-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.x86_64",
"7Client-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.aarch64",
"7Client-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.ppc64",
"7Client-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.ppc64le",
"7Client-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.s390x",
"7Client-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.x86_64",
"7Client-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.aarch64",
"7Client-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.ppc64",
"7Client-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.ppc64le",
"7Client-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.s390x",
"7Client-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.x86_64",
"7Client-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.aarch64",
"7Client-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.ppc64",
"7Client-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.ppc64le",
"7Client-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.s390x",
"7Client-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.x86_64",
"7Client-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.aarch64",
"7Client-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.ppc64",
"7Client-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.ppc64le",
"7Client-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.s390x",
"7Client-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.x86_64",
"7ComputeNode-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.aarch64",
"7ComputeNode-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.ppc64",
"7ComputeNode-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.ppc64le",
"7ComputeNode-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.s390x",
"7ComputeNode-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.src",
"7ComputeNode-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.x86_64",
"7ComputeNode-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.aarch64",
"7ComputeNode-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.ppc64",
"7ComputeNode-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.ppc64le",
"7ComputeNode-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.s390x",
"7ComputeNode-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.x86_64",
"7ComputeNode-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.aarch64",
"7ComputeNode-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.ppc64",
"7ComputeNode-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.ppc64le",
"7ComputeNode-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.s390x",
"7ComputeNode-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.x86_64",
"7ComputeNode-optional-7.3.Z:httpd-manual-0:2.4.6-45.el7_3.4.noarch",
"7ComputeNode-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.aarch64",
"7ComputeNode-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.ppc64",
"7ComputeNode-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.ppc64le",
"7ComputeNode-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.s390x",
"7ComputeNode-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.x86_64",
"7ComputeNode-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.aarch64",
"7ComputeNode-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.ppc64",
"7ComputeNode-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.ppc64le",
"7ComputeNode-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.s390x",
"7ComputeNode-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.x86_64",
"7ComputeNode-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.aarch64",
"7ComputeNode-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.ppc64",
"7ComputeNode-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.ppc64le",
"7ComputeNode-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.s390x",
"7ComputeNode-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.x86_64",
"7ComputeNode-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.aarch64",
"7ComputeNode-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.ppc64",
"7ComputeNode-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.ppc64le",
"7ComputeNode-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.s390x",
"7ComputeNode-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.x86_64",
"7ComputeNode-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.aarch64",
"7ComputeNode-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.ppc64",
"7ComputeNode-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.ppc64le",
"7ComputeNode-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.s390x",
"7ComputeNode-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.x86_64",
"7Server-7.3.Z:httpd-0:2.4.6-45.el7_3.4.aarch64",
"7Server-7.3.Z:httpd-0:2.4.6-45.el7_3.4.ppc64",
"7Server-7.3.Z:httpd-0:2.4.6-45.el7_3.4.ppc64le",
"7Server-7.3.Z:httpd-0:2.4.6-45.el7_3.4.s390x",
"7Server-7.3.Z:httpd-0:2.4.6-45.el7_3.4.src",
"7Server-7.3.Z:httpd-0:2.4.6-45.el7_3.4.x86_64",
"7Server-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.aarch64",
"7Server-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.ppc64",
"7Server-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.ppc64le",
"7Server-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.s390x",
"7Server-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.x86_64",
"7Server-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.aarch64",
"7Server-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.ppc64",
"7Server-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.ppc64le",
"7Server-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.s390x",
"7Server-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.x86_64",
"7Server-7.3.Z:httpd-manual-0:2.4.6-45.el7_3.4.noarch",
"7Server-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.aarch64",
"7Server-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.ppc64",
"7Server-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.ppc64le",
"7Server-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.s390x",
"7Server-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.x86_64",
"7Server-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.aarch64",
"7Server-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.ppc64",
"7Server-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.ppc64le",
"7Server-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.s390x",
"7Server-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.x86_64",
"7Server-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.aarch64",
"7Server-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.ppc64",
"7Server-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.ppc64le",
"7Server-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.s390x",
"7Server-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.x86_64",
"7Server-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.aarch64",
"7Server-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.ppc64",
"7Server-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.ppc64le",
"7Server-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.s390x",
"7Server-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.x86_64",
"7Server-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.aarch64",
"7Server-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.ppc64",
"7Server-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.ppc64le",
"7Server-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.s390x",
"7Server-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.x86_64",
"7Server-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.aarch64",
"7Server-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.ppc64",
"7Server-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.ppc64le",
"7Server-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.s390x",
"7Server-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.src",
"7Server-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.x86_64",
"7Server-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.aarch64",
"7Server-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.ppc64",
"7Server-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.ppc64le",
"7Server-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.s390x",
"7Server-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.x86_64",
"7Server-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.aarch64",
"7Server-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.ppc64",
"7Server-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.ppc64le",
"7Server-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.s390x",
"7Server-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.x86_64",
"7Server-optional-7.3.Z:httpd-manual-0:2.4.6-45.el7_3.4.noarch",
"7Server-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.aarch64",
"7Server-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.ppc64",
"7Server-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.ppc64le",
"7Server-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.s390x",
"7Server-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.x86_64",
"7Server-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.aarch64",
"7Server-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.ppc64",
"7Server-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.ppc64le",
"7Server-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.s390x",
"7Server-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.x86_64",
"7Server-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.aarch64",
"7Server-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.ppc64",
"7Server-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.ppc64le",
"7Server-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.s390x",
"7Server-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.x86_64",
"7Server-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.aarch64",
"7Server-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.ppc64",
"7Server-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.ppc64le",
"7Server-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.s390x",
"7Server-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.x86_64",
"7Server-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.aarch64",
"7Server-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.ppc64",
"7Server-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.ppc64le",
"7Server-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.s390x",
"7Server-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.x86_64",
"7Workstation-7.3.Z:httpd-0:2.4.6-45.el7_3.4.aarch64",
"7Workstation-7.3.Z:httpd-0:2.4.6-45.el7_3.4.ppc64",
"7Workstation-7.3.Z:httpd-0:2.4.6-45.el7_3.4.ppc64le",
"7Workstation-7.3.Z:httpd-0:2.4.6-45.el7_3.4.s390x",
"7Workstation-7.3.Z:httpd-0:2.4.6-45.el7_3.4.src",
"7Workstation-7.3.Z:httpd-0:2.4.6-45.el7_3.4.x86_64",
"7Workstation-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.aarch64",
"7Workstation-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.ppc64",
"7Workstation-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.ppc64le",
"7Workstation-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.s390x",
"7Workstation-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.x86_64",
"7Workstation-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.aarch64",
"7Workstation-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.ppc64",
"7Workstation-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.ppc64le",
"7Workstation-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.s390x",
"7Workstation-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.x86_64",
"7Workstation-7.3.Z:httpd-manual-0:2.4.6-45.el7_3.4.noarch",
"7Workstation-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.aarch64",
"7Workstation-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.ppc64",
"7Workstation-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.ppc64le",
"7Workstation-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.s390x",
"7Workstation-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.x86_64",
"7Workstation-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.aarch64",
"7Workstation-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.ppc64",
"7Workstation-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.ppc64le",
"7Workstation-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.s390x",
"7Workstation-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.x86_64",
"7Workstation-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.aarch64",
"7Workstation-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.ppc64",
"7Workstation-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.ppc64le",
"7Workstation-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.s390x",
"7Workstation-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.x86_64",
"7Workstation-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.aarch64",
"7Workstation-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.ppc64",
"7Workstation-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.ppc64le",
"7Workstation-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.s390x",
"7Workstation-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.x86_64",
"7Workstation-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.aarch64",
"7Workstation-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.ppc64",
"7Workstation-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.ppc64le",
"7Workstation-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.s390x",
"7Workstation-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.x86_64",
"7Workstation-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.aarch64",
"7Workstation-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.ppc64",
"7Workstation-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.ppc64le",
"7Workstation-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.s390x",
"7Workstation-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.src",
"7Workstation-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.x86_64",
"7Workstation-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.aarch64",
"7Workstation-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.ppc64",
"7Workstation-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.ppc64le",
"7Workstation-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.s390x",
"7Workstation-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.x86_64",
"7Workstation-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.aarch64",
"7Workstation-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.ppc64",
"7Workstation-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.ppc64le",
"7Workstation-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.s390x",
"7Workstation-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.x86_64",
"7Workstation-optional-7.3.Z:httpd-manual-0:2.4.6-45.el7_3.4.noarch",
"7Workstation-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.aarch64",
"7Workstation-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.ppc64",
"7Workstation-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.ppc64le",
"7Workstation-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.s390x",
"7Workstation-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.x86_64",
"7Workstation-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.aarch64",
"7Workstation-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.ppc64",
"7Workstation-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.ppc64le",
"7Workstation-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.s390x",
"7Workstation-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.x86_64",
"7Workstation-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.aarch64",
"7Workstation-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.ppc64",
"7Workstation-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.ppc64le",
"7Workstation-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.s390x",
"7Workstation-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.x86_64",
"7Workstation-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.aarch64",
"7Workstation-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.ppc64",
"7Workstation-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.ppc64le",
"7Workstation-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.s390x",
"7Workstation-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.x86_64",
"7Workstation-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.aarch64",
"7Workstation-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.ppc64",
"7Workstation-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.ppc64le",
"7Workstation-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.s390x",
"7Workstation-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2017:0906"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "HIGH",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.0,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:H/Au:N/C:P/I:P/A:N",
"version": "2.0"
},
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N",
"version": "3.0"
},
"products": [
"7Client-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.aarch64",
"7Client-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.ppc64",
"7Client-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.ppc64le",
"7Client-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.s390x",
"7Client-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.src",
"7Client-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.x86_64",
"7Client-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.aarch64",
"7Client-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.ppc64",
"7Client-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.ppc64le",
"7Client-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.s390x",
"7Client-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.x86_64",
"7Client-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.aarch64",
"7Client-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.ppc64",
"7Client-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.ppc64le",
"7Client-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.s390x",
"7Client-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.x86_64",
"7Client-optional-7.3.Z:httpd-manual-0:2.4.6-45.el7_3.4.noarch",
"7Client-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.aarch64",
"7Client-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.ppc64",
"7Client-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.ppc64le",
"7Client-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.s390x",
"7Client-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.x86_64",
"7Client-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.aarch64",
"7Client-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.ppc64",
"7Client-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.ppc64le",
"7Client-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.s390x",
"7Client-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.x86_64",
"7Client-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.aarch64",
"7Client-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.ppc64",
"7Client-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.ppc64le",
"7Client-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.s390x",
"7Client-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.x86_64",
"7Client-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.aarch64",
"7Client-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.ppc64",
"7Client-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.ppc64le",
"7Client-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.s390x",
"7Client-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.x86_64",
"7Client-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.aarch64",
"7Client-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.ppc64",
"7Client-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.ppc64le",
"7Client-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.s390x",
"7Client-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.x86_64",
"7ComputeNode-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.aarch64",
"7ComputeNode-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.ppc64",
"7ComputeNode-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.ppc64le",
"7ComputeNode-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.s390x",
"7ComputeNode-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.src",
"7ComputeNode-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.x86_64",
"7ComputeNode-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.aarch64",
"7ComputeNode-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.ppc64",
"7ComputeNode-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.ppc64le",
"7ComputeNode-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.s390x",
"7ComputeNode-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.x86_64",
"7ComputeNode-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.aarch64",
"7ComputeNode-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.ppc64",
"7ComputeNode-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.ppc64le",
"7ComputeNode-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.s390x",
"7ComputeNode-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.x86_64",
"7ComputeNode-optional-7.3.Z:httpd-manual-0:2.4.6-45.el7_3.4.noarch",
"7ComputeNode-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.aarch64",
"7ComputeNode-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.ppc64",
"7ComputeNode-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.ppc64le",
"7ComputeNode-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.s390x",
"7ComputeNode-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.x86_64",
"7ComputeNode-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.aarch64",
"7ComputeNode-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.ppc64",
"7ComputeNode-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.ppc64le",
"7ComputeNode-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.s390x",
"7ComputeNode-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.x86_64",
"7ComputeNode-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.aarch64",
"7ComputeNode-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.ppc64",
"7ComputeNode-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.ppc64le",
"7ComputeNode-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.s390x",
"7ComputeNode-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.x86_64",
"7ComputeNode-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.aarch64",
"7ComputeNode-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.ppc64",
"7ComputeNode-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.ppc64le",
"7ComputeNode-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.s390x",
"7ComputeNode-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.x86_64",
"7ComputeNode-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.aarch64",
"7ComputeNode-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.ppc64",
"7ComputeNode-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.ppc64le",
"7ComputeNode-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.s390x",
"7ComputeNode-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.x86_64",
"7Server-7.3.Z:httpd-0:2.4.6-45.el7_3.4.aarch64",
"7Server-7.3.Z:httpd-0:2.4.6-45.el7_3.4.ppc64",
"7Server-7.3.Z:httpd-0:2.4.6-45.el7_3.4.ppc64le",
"7Server-7.3.Z:httpd-0:2.4.6-45.el7_3.4.s390x",
"7Server-7.3.Z:httpd-0:2.4.6-45.el7_3.4.src",
"7Server-7.3.Z:httpd-0:2.4.6-45.el7_3.4.x86_64",
"7Server-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.aarch64",
"7Server-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.ppc64",
"7Server-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.ppc64le",
"7Server-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.s390x",
"7Server-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.x86_64",
"7Server-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.aarch64",
"7Server-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.ppc64",
"7Server-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.ppc64le",
"7Server-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.s390x",
"7Server-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.x86_64",
"7Server-7.3.Z:httpd-manual-0:2.4.6-45.el7_3.4.noarch",
"7Server-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.aarch64",
"7Server-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.ppc64",
"7Server-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.ppc64le",
"7Server-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.s390x",
"7Server-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.x86_64",
"7Server-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.aarch64",
"7Server-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.ppc64",
"7Server-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.ppc64le",
"7Server-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.s390x",
"7Server-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.x86_64",
"7Server-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.aarch64",
"7Server-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.ppc64",
"7Server-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.ppc64le",
"7Server-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.s390x",
"7Server-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.x86_64",
"7Server-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.aarch64",
"7Server-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.ppc64",
"7Server-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.ppc64le",
"7Server-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.s390x",
"7Server-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.x86_64",
"7Server-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.aarch64",
"7Server-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.ppc64",
"7Server-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.ppc64le",
"7Server-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.s390x",
"7Server-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.x86_64",
"7Server-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.aarch64",
"7Server-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.ppc64",
"7Server-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.ppc64le",
"7Server-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.s390x",
"7Server-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.src",
"7Server-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.x86_64",
"7Server-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.aarch64",
"7Server-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.ppc64",
"7Server-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.ppc64le",
"7Server-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.s390x",
"7Server-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.x86_64",
"7Server-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.aarch64",
"7Server-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.ppc64",
"7Server-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.ppc64le",
"7Server-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.s390x",
"7Server-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.x86_64",
"7Server-optional-7.3.Z:httpd-manual-0:2.4.6-45.el7_3.4.noarch",
"7Server-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.aarch64",
"7Server-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.ppc64",
"7Server-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.ppc64le",
"7Server-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.s390x",
"7Server-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.x86_64",
"7Server-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.aarch64",
"7Server-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.ppc64",
"7Server-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.ppc64le",
"7Server-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.s390x",
"7Server-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.x86_64",
"7Server-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.aarch64",
"7Server-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.ppc64",
"7Server-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.ppc64le",
"7Server-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.s390x",
"7Server-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.x86_64",
"7Server-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.aarch64",
"7Server-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.ppc64",
"7Server-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.ppc64le",
"7Server-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.s390x",
"7Server-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.x86_64",
"7Server-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.aarch64",
"7Server-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.ppc64",
"7Server-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.ppc64le",
"7Server-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.s390x",
"7Server-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.x86_64",
"7Workstation-7.3.Z:httpd-0:2.4.6-45.el7_3.4.aarch64",
"7Workstation-7.3.Z:httpd-0:2.4.6-45.el7_3.4.ppc64",
"7Workstation-7.3.Z:httpd-0:2.4.6-45.el7_3.4.ppc64le",
"7Workstation-7.3.Z:httpd-0:2.4.6-45.el7_3.4.s390x",
"7Workstation-7.3.Z:httpd-0:2.4.6-45.el7_3.4.src",
"7Workstation-7.3.Z:httpd-0:2.4.6-45.el7_3.4.x86_64",
"7Workstation-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.aarch64",
"7Workstation-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.ppc64",
"7Workstation-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.ppc64le",
"7Workstation-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.s390x",
"7Workstation-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.x86_64",
"7Workstation-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.aarch64",
"7Workstation-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.ppc64",
"7Workstation-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.ppc64le",
"7Workstation-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.s390x",
"7Workstation-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.x86_64",
"7Workstation-7.3.Z:httpd-manual-0:2.4.6-45.el7_3.4.noarch",
"7Workstation-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.aarch64",
"7Workstation-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.ppc64",
"7Workstation-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.ppc64le",
"7Workstation-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.s390x",
"7Workstation-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.x86_64",
"7Workstation-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.aarch64",
"7Workstation-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.ppc64",
"7Workstation-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.ppc64le",
"7Workstation-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.s390x",
"7Workstation-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.x86_64",
"7Workstation-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.aarch64",
"7Workstation-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.ppc64",
"7Workstation-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.ppc64le",
"7Workstation-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.s390x",
"7Workstation-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.x86_64",
"7Workstation-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.aarch64",
"7Workstation-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.ppc64",
"7Workstation-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.ppc64le",
"7Workstation-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.s390x",
"7Workstation-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.x86_64",
"7Workstation-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.aarch64",
"7Workstation-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.ppc64",
"7Workstation-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.ppc64le",
"7Workstation-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.s390x",
"7Workstation-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.x86_64",
"7Workstation-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.aarch64",
"7Workstation-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.ppc64",
"7Workstation-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.ppc64le",
"7Workstation-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.s390x",
"7Workstation-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.src",
"7Workstation-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.x86_64",
"7Workstation-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.aarch64",
"7Workstation-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.ppc64",
"7Workstation-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.ppc64le",
"7Workstation-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.s390x",
"7Workstation-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.x86_64",
"7Workstation-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.aarch64",
"7Workstation-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.ppc64",
"7Workstation-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.ppc64le",
"7Workstation-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.s390x",
"7Workstation-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.x86_64",
"7Workstation-optional-7.3.Z:httpd-manual-0:2.4.6-45.el7_3.4.noarch",
"7Workstation-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.aarch64",
"7Workstation-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.ppc64",
"7Workstation-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.ppc64le",
"7Workstation-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.s390x",
"7Workstation-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.x86_64",
"7Workstation-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.aarch64",
"7Workstation-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.ppc64",
"7Workstation-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.ppc64le",
"7Workstation-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.s390x",
"7Workstation-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.x86_64",
"7Workstation-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.aarch64",
"7Workstation-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.ppc64",
"7Workstation-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.ppc64le",
"7Workstation-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.s390x",
"7Workstation-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.x86_64",
"7Workstation-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.aarch64",
"7Workstation-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.ppc64",
"7Workstation-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.ppc64le",
"7Workstation-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.s390x",
"7Workstation-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.x86_64",
"7Workstation-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.aarch64",
"7Workstation-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.ppc64",
"7Workstation-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.ppc64le",
"7Workstation-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.s390x",
"7Workstation-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "httpd: Padding Oracle in Apache mod_session_crypto"
},
{
"cve": "CVE-2016-2161",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"discovery_date": "2016-12-20T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1406753"
}
],
"notes": [
{
"category": "description",
"text": "It was discovered that the mod_auth_digest module of httpd did not properly check for memory allocation failures. A remote attacker could use this flaw to cause httpd child processes to repeatedly crash if the server used HTTP digest authentication.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "httpd: DoS vulnerability in mod_auth_digest",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Client-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.aarch64",
"7Client-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.ppc64",
"7Client-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.ppc64le",
"7Client-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.s390x",
"7Client-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.src",
"7Client-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.x86_64",
"7Client-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.aarch64",
"7Client-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.ppc64",
"7Client-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.ppc64le",
"7Client-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.s390x",
"7Client-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.x86_64",
"7Client-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.aarch64",
"7Client-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.ppc64",
"7Client-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.ppc64le",
"7Client-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.s390x",
"7Client-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.x86_64",
"7Client-optional-7.3.Z:httpd-manual-0:2.4.6-45.el7_3.4.noarch",
"7Client-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.aarch64",
"7Client-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.ppc64",
"7Client-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.ppc64le",
"7Client-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.s390x",
"7Client-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.x86_64",
"7Client-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.aarch64",
"7Client-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.ppc64",
"7Client-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.ppc64le",
"7Client-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.s390x",
"7Client-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.x86_64",
"7Client-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.aarch64",
"7Client-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.ppc64",
"7Client-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.ppc64le",
"7Client-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.s390x",
"7Client-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.x86_64",
"7Client-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.aarch64",
"7Client-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.ppc64",
"7Client-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.ppc64le",
"7Client-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.s390x",
"7Client-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.x86_64",
"7Client-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.aarch64",
"7Client-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.ppc64",
"7Client-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.ppc64le",
"7Client-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.s390x",
"7Client-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.x86_64",
"7ComputeNode-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.aarch64",
"7ComputeNode-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.ppc64",
"7ComputeNode-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.ppc64le",
"7ComputeNode-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.s390x",
"7ComputeNode-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.src",
"7ComputeNode-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.x86_64",
"7ComputeNode-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.aarch64",
"7ComputeNode-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.ppc64",
"7ComputeNode-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.ppc64le",
"7ComputeNode-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.s390x",
"7ComputeNode-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.x86_64",
"7ComputeNode-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.aarch64",
"7ComputeNode-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.ppc64",
"7ComputeNode-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.ppc64le",
"7ComputeNode-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.s390x",
"7ComputeNode-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.x86_64",
"7ComputeNode-optional-7.3.Z:httpd-manual-0:2.4.6-45.el7_3.4.noarch",
"7ComputeNode-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.aarch64",
"7ComputeNode-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.ppc64",
"7ComputeNode-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.ppc64le",
"7ComputeNode-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.s390x",
"7ComputeNode-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.x86_64",
"7ComputeNode-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.aarch64",
"7ComputeNode-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.ppc64",
"7ComputeNode-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.ppc64le",
"7ComputeNode-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.s390x",
"7ComputeNode-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.x86_64",
"7ComputeNode-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.aarch64",
"7ComputeNode-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.ppc64",
"7ComputeNode-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.ppc64le",
"7ComputeNode-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.s390x",
"7ComputeNode-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.x86_64",
"7ComputeNode-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.aarch64",
"7ComputeNode-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.ppc64",
"7ComputeNode-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.ppc64le",
"7ComputeNode-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.s390x",
"7ComputeNode-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.x86_64",
"7ComputeNode-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.aarch64",
"7ComputeNode-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.ppc64",
"7ComputeNode-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.ppc64le",
"7ComputeNode-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.s390x",
"7ComputeNode-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.x86_64",
"7Server-7.3.Z:httpd-0:2.4.6-45.el7_3.4.aarch64",
"7Server-7.3.Z:httpd-0:2.4.6-45.el7_3.4.ppc64",
"7Server-7.3.Z:httpd-0:2.4.6-45.el7_3.4.ppc64le",
"7Server-7.3.Z:httpd-0:2.4.6-45.el7_3.4.s390x",
"7Server-7.3.Z:httpd-0:2.4.6-45.el7_3.4.src",
"7Server-7.3.Z:httpd-0:2.4.6-45.el7_3.4.x86_64",
"7Server-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.aarch64",
"7Server-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.ppc64",
"7Server-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.ppc64le",
"7Server-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.s390x",
"7Server-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.x86_64",
"7Server-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.aarch64",
"7Server-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.ppc64",
"7Server-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.ppc64le",
"7Server-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.s390x",
"7Server-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.x86_64",
"7Server-7.3.Z:httpd-manual-0:2.4.6-45.el7_3.4.noarch",
"7Server-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.aarch64",
"7Server-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.ppc64",
"7Server-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.ppc64le",
"7Server-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.s390x",
"7Server-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.x86_64",
"7Server-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.aarch64",
"7Server-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.ppc64",
"7Server-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.ppc64le",
"7Server-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.s390x",
"7Server-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.x86_64",
"7Server-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.aarch64",
"7Server-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.ppc64",
"7Server-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.ppc64le",
"7Server-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.s390x",
"7Server-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.x86_64",
"7Server-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.aarch64",
"7Server-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.ppc64",
"7Server-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.ppc64le",
"7Server-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.s390x",
"7Server-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.x86_64",
"7Server-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.aarch64",
"7Server-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.ppc64",
"7Server-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.ppc64le",
"7Server-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.s390x",
"7Server-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.x86_64",
"7Server-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.aarch64",
"7Server-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.ppc64",
"7Server-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.ppc64le",
"7Server-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.s390x",
"7Server-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.src",
"7Server-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.x86_64",
"7Server-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.aarch64",
"7Server-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.ppc64",
"7Server-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.ppc64le",
"7Server-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.s390x",
"7Server-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.x86_64",
"7Server-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.aarch64",
"7Server-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.ppc64",
"7Server-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.ppc64le",
"7Server-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.s390x",
"7Server-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.x86_64",
"7Server-optional-7.3.Z:httpd-manual-0:2.4.6-45.el7_3.4.noarch",
"7Server-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.aarch64",
"7Server-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.ppc64",
"7Server-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.ppc64le",
"7Server-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.s390x",
"7Server-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.x86_64",
"7Server-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.aarch64",
"7Server-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.ppc64",
"7Server-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.ppc64le",
"7Server-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.s390x",
"7Server-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.x86_64",
"7Server-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.aarch64",
"7Server-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.ppc64",
"7Server-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.ppc64le",
"7Server-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.s390x",
"7Server-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.x86_64",
"7Server-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.aarch64",
"7Server-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.ppc64",
"7Server-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.ppc64le",
"7Server-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.s390x",
"7Server-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.x86_64",
"7Server-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.aarch64",
"7Server-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.ppc64",
"7Server-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.ppc64le",
"7Server-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.s390x",
"7Server-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.x86_64",
"7Workstation-7.3.Z:httpd-0:2.4.6-45.el7_3.4.aarch64",
"7Workstation-7.3.Z:httpd-0:2.4.6-45.el7_3.4.ppc64",
"7Workstation-7.3.Z:httpd-0:2.4.6-45.el7_3.4.ppc64le",
"7Workstation-7.3.Z:httpd-0:2.4.6-45.el7_3.4.s390x",
"7Workstation-7.3.Z:httpd-0:2.4.6-45.el7_3.4.src",
"7Workstation-7.3.Z:httpd-0:2.4.6-45.el7_3.4.x86_64",
"7Workstation-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.aarch64",
"7Workstation-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.ppc64",
"7Workstation-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.ppc64le",
"7Workstation-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.s390x",
"7Workstation-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.x86_64",
"7Workstation-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.aarch64",
"7Workstation-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.ppc64",
"7Workstation-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.ppc64le",
"7Workstation-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.s390x",
"7Workstation-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.x86_64",
"7Workstation-7.3.Z:httpd-manual-0:2.4.6-45.el7_3.4.noarch",
"7Workstation-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.aarch64",
"7Workstation-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.ppc64",
"7Workstation-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.ppc64le",
"7Workstation-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.s390x",
"7Workstation-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.x86_64",
"7Workstation-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.aarch64",
"7Workstation-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.ppc64",
"7Workstation-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.ppc64le",
"7Workstation-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.s390x",
"7Workstation-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.x86_64",
"7Workstation-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.aarch64",
"7Workstation-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.ppc64",
"7Workstation-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.ppc64le",
"7Workstation-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.s390x",
"7Workstation-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.x86_64",
"7Workstation-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.aarch64",
"7Workstation-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.ppc64",
"7Workstation-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.ppc64le",
"7Workstation-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.s390x",
"7Workstation-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.x86_64",
"7Workstation-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.aarch64",
"7Workstation-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.ppc64",
"7Workstation-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.ppc64le",
"7Workstation-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.s390x",
"7Workstation-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.x86_64",
"7Workstation-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.aarch64",
"7Workstation-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.ppc64",
"7Workstation-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.ppc64le",
"7Workstation-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.s390x",
"7Workstation-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.src",
"7Workstation-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.x86_64",
"7Workstation-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.aarch64",
"7Workstation-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.ppc64",
"7Workstation-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.ppc64le",
"7Workstation-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.s390x",
"7Workstation-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.x86_64",
"7Workstation-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.aarch64",
"7Workstation-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.ppc64",
"7Workstation-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.ppc64le",
"7Workstation-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.s390x",
"7Workstation-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.x86_64",
"7Workstation-optional-7.3.Z:httpd-manual-0:2.4.6-45.el7_3.4.noarch",
"7Workstation-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.aarch64",
"7Workstation-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.ppc64",
"7Workstation-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.ppc64le",
"7Workstation-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.s390x",
"7Workstation-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.x86_64",
"7Workstation-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.aarch64",
"7Workstation-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.ppc64",
"7Workstation-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.ppc64le",
"7Workstation-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.s390x",
"7Workstation-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.x86_64",
"7Workstation-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.aarch64",
"7Workstation-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.ppc64",
"7Workstation-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.ppc64le",
"7Workstation-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.s390x",
"7Workstation-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.x86_64",
"7Workstation-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.aarch64",
"7Workstation-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.ppc64",
"7Workstation-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.ppc64le",
"7Workstation-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.s390x",
"7Workstation-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.x86_64",
"7Workstation-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.aarch64",
"7Workstation-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.ppc64",
"7Workstation-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.ppc64le",
"7Workstation-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.s390x",
"7Workstation-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2016-2161"
},
{
"category": "external",
"summary": "RHBZ#1406753",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1406753"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2016-2161",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-2161"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-2161",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2016-2161"
},
{
"category": "external",
"summary": "https://httpd.apache.org/security/vulnerabilities_24.html#2.4.25",
"url": "https://httpd.apache.org/security/vulnerabilities_24.html#2.4.25"
}
],
"release_date": "2016-12-20T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2017-04-12T12:24:45+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically.",
"product_ids": [
"7Client-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.aarch64",
"7Client-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.ppc64",
"7Client-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.ppc64le",
"7Client-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.s390x",
"7Client-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.src",
"7Client-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.x86_64",
"7Client-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.aarch64",
"7Client-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.ppc64",
"7Client-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.ppc64le",
"7Client-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.s390x",
"7Client-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.x86_64",
"7Client-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.aarch64",
"7Client-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.ppc64",
"7Client-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.ppc64le",
"7Client-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.s390x",
"7Client-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.x86_64",
"7Client-optional-7.3.Z:httpd-manual-0:2.4.6-45.el7_3.4.noarch",
"7Client-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.aarch64",
"7Client-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.ppc64",
"7Client-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.ppc64le",
"7Client-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.s390x",
"7Client-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.x86_64",
"7Client-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.aarch64",
"7Client-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.ppc64",
"7Client-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.ppc64le",
"7Client-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.s390x",
"7Client-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.x86_64",
"7Client-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.aarch64",
"7Client-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.ppc64",
"7Client-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.ppc64le",
"7Client-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.s390x",
"7Client-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.x86_64",
"7Client-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.aarch64",
"7Client-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.ppc64",
"7Client-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.ppc64le",
"7Client-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.s390x",
"7Client-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.x86_64",
"7Client-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.aarch64",
"7Client-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.ppc64",
"7Client-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.ppc64le",
"7Client-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.s390x",
"7Client-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.x86_64",
"7ComputeNode-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.aarch64",
"7ComputeNode-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.ppc64",
"7ComputeNode-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.ppc64le",
"7ComputeNode-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.s390x",
"7ComputeNode-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.src",
"7ComputeNode-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.x86_64",
"7ComputeNode-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.aarch64",
"7ComputeNode-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.ppc64",
"7ComputeNode-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.ppc64le",
"7ComputeNode-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.s390x",
"7ComputeNode-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.x86_64",
"7ComputeNode-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.aarch64",
"7ComputeNode-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.ppc64",
"7ComputeNode-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.ppc64le",
"7ComputeNode-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.s390x",
"7ComputeNode-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.x86_64",
"7ComputeNode-optional-7.3.Z:httpd-manual-0:2.4.6-45.el7_3.4.noarch",
"7ComputeNode-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.aarch64",
"7ComputeNode-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.ppc64",
"7ComputeNode-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.ppc64le",
"7ComputeNode-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.s390x",
"7ComputeNode-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.x86_64",
"7ComputeNode-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.aarch64",
"7ComputeNode-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.ppc64",
"7ComputeNode-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.ppc64le",
"7ComputeNode-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.s390x",
"7ComputeNode-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.x86_64",
"7ComputeNode-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.aarch64",
"7ComputeNode-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.ppc64",
"7ComputeNode-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.ppc64le",
"7ComputeNode-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.s390x",
"7ComputeNode-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.x86_64",
"7ComputeNode-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.aarch64",
"7ComputeNode-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.ppc64",
"7ComputeNode-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.ppc64le",
"7ComputeNode-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.s390x",
"7ComputeNode-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.x86_64",
"7ComputeNode-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.aarch64",
"7ComputeNode-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.ppc64",
"7ComputeNode-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.ppc64le",
"7ComputeNode-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.s390x",
"7ComputeNode-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.x86_64",
"7Server-7.3.Z:httpd-0:2.4.6-45.el7_3.4.aarch64",
"7Server-7.3.Z:httpd-0:2.4.6-45.el7_3.4.ppc64",
"7Server-7.3.Z:httpd-0:2.4.6-45.el7_3.4.ppc64le",
"7Server-7.3.Z:httpd-0:2.4.6-45.el7_3.4.s390x",
"7Server-7.3.Z:httpd-0:2.4.6-45.el7_3.4.src",
"7Server-7.3.Z:httpd-0:2.4.6-45.el7_3.4.x86_64",
"7Server-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.aarch64",
"7Server-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.ppc64",
"7Server-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.ppc64le",
"7Server-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.s390x",
"7Server-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.x86_64",
"7Server-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.aarch64",
"7Server-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.ppc64",
"7Server-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.ppc64le",
"7Server-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.s390x",
"7Server-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.x86_64",
"7Server-7.3.Z:httpd-manual-0:2.4.6-45.el7_3.4.noarch",
"7Server-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.aarch64",
"7Server-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.ppc64",
"7Server-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.ppc64le",
"7Server-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.s390x",
"7Server-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.x86_64",
"7Server-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.aarch64",
"7Server-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.ppc64",
"7Server-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.ppc64le",
"7Server-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.s390x",
"7Server-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.x86_64",
"7Server-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.aarch64",
"7Server-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.ppc64",
"7Server-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.ppc64le",
"7Server-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.s390x",
"7Server-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.x86_64",
"7Server-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.aarch64",
"7Server-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.ppc64",
"7Server-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.ppc64le",
"7Server-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.s390x",
"7Server-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.x86_64",
"7Server-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.aarch64",
"7Server-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.ppc64",
"7Server-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.ppc64le",
"7Server-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.s390x",
"7Server-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.x86_64",
"7Server-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.aarch64",
"7Server-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.ppc64",
"7Server-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.ppc64le",
"7Server-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.s390x",
"7Server-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.src",
"7Server-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.x86_64",
"7Server-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.aarch64",
"7Server-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.ppc64",
"7Server-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.ppc64le",
"7Server-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.s390x",
"7Server-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.x86_64",
"7Server-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.aarch64",
"7Server-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.ppc64",
"7Server-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.ppc64le",
"7Server-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.s390x",
"7Server-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.x86_64",
"7Server-optional-7.3.Z:httpd-manual-0:2.4.6-45.el7_3.4.noarch",
"7Server-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.aarch64",
"7Server-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.ppc64",
"7Server-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.ppc64le",
"7Server-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.s390x",
"7Server-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.x86_64",
"7Server-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.aarch64",
"7Server-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.ppc64",
"7Server-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.ppc64le",
"7Server-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.s390x",
"7Server-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.x86_64",
"7Server-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.aarch64",
"7Server-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.ppc64",
"7Server-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.ppc64le",
"7Server-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.s390x",
"7Server-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.x86_64",
"7Server-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.aarch64",
"7Server-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.ppc64",
"7Server-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.ppc64le",
"7Server-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.s390x",
"7Server-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.x86_64",
"7Server-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.aarch64",
"7Server-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.ppc64",
"7Server-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.ppc64le",
"7Server-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.s390x",
"7Server-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.x86_64",
"7Workstation-7.3.Z:httpd-0:2.4.6-45.el7_3.4.aarch64",
"7Workstation-7.3.Z:httpd-0:2.4.6-45.el7_3.4.ppc64",
"7Workstation-7.3.Z:httpd-0:2.4.6-45.el7_3.4.ppc64le",
"7Workstation-7.3.Z:httpd-0:2.4.6-45.el7_3.4.s390x",
"7Workstation-7.3.Z:httpd-0:2.4.6-45.el7_3.4.src",
"7Workstation-7.3.Z:httpd-0:2.4.6-45.el7_3.4.x86_64",
"7Workstation-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.aarch64",
"7Workstation-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.ppc64",
"7Workstation-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.ppc64le",
"7Workstation-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.s390x",
"7Workstation-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.x86_64",
"7Workstation-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.aarch64",
"7Workstation-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.ppc64",
"7Workstation-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.ppc64le",
"7Workstation-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.s390x",
"7Workstation-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.x86_64",
"7Workstation-7.3.Z:httpd-manual-0:2.4.6-45.el7_3.4.noarch",
"7Workstation-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.aarch64",
"7Workstation-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.ppc64",
"7Workstation-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.ppc64le",
"7Workstation-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.s390x",
"7Workstation-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.x86_64",
"7Workstation-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.aarch64",
"7Workstation-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.ppc64",
"7Workstation-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.ppc64le",
"7Workstation-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.s390x",
"7Workstation-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.x86_64",
"7Workstation-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.aarch64",
"7Workstation-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.ppc64",
"7Workstation-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.ppc64le",
"7Workstation-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.s390x",
"7Workstation-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.x86_64",
"7Workstation-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.aarch64",
"7Workstation-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.ppc64",
"7Workstation-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.ppc64le",
"7Workstation-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.s390x",
"7Workstation-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.x86_64",
"7Workstation-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.aarch64",
"7Workstation-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.ppc64",
"7Workstation-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.ppc64le",
"7Workstation-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.s390x",
"7Workstation-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.x86_64",
"7Workstation-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.aarch64",
"7Workstation-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.ppc64",
"7Workstation-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.ppc64le",
"7Workstation-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.s390x",
"7Workstation-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.src",
"7Workstation-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.x86_64",
"7Workstation-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.aarch64",
"7Workstation-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.ppc64",
"7Workstation-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.ppc64le",
"7Workstation-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.s390x",
"7Workstation-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.x86_64",
"7Workstation-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.aarch64",
"7Workstation-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.ppc64",
"7Workstation-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.ppc64le",
"7Workstation-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.s390x",
"7Workstation-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.x86_64",
"7Workstation-optional-7.3.Z:httpd-manual-0:2.4.6-45.el7_3.4.noarch",
"7Workstation-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.aarch64",
"7Workstation-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.ppc64",
"7Workstation-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.ppc64le",
"7Workstation-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.s390x",
"7Workstation-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.x86_64",
"7Workstation-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.aarch64",
"7Workstation-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.ppc64",
"7Workstation-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.ppc64le",
"7Workstation-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.s390x",
"7Workstation-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.x86_64",
"7Workstation-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.aarch64",
"7Workstation-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.ppc64",
"7Workstation-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.ppc64le",
"7Workstation-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.s390x",
"7Workstation-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.x86_64",
"7Workstation-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.aarch64",
"7Workstation-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.ppc64",
"7Workstation-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.ppc64le",
"7Workstation-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.s390x",
"7Workstation-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.x86_64",
"7Workstation-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.aarch64",
"7Workstation-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.ppc64",
"7Workstation-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.ppc64le",
"7Workstation-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.s390x",
"7Workstation-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2017:0906"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"7Client-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.aarch64",
"7Client-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.ppc64",
"7Client-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.ppc64le",
"7Client-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.s390x",
"7Client-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.src",
"7Client-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.x86_64",
"7Client-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.aarch64",
"7Client-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.ppc64",
"7Client-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.ppc64le",
"7Client-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.s390x",
"7Client-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.x86_64",
"7Client-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.aarch64",
"7Client-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.ppc64",
"7Client-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.ppc64le",
"7Client-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.s390x",
"7Client-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.x86_64",
"7Client-optional-7.3.Z:httpd-manual-0:2.4.6-45.el7_3.4.noarch",
"7Client-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.aarch64",
"7Client-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.ppc64",
"7Client-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.ppc64le",
"7Client-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.s390x",
"7Client-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.x86_64",
"7Client-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.aarch64",
"7Client-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.ppc64",
"7Client-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.ppc64le",
"7Client-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.s390x",
"7Client-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.x86_64",
"7Client-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.aarch64",
"7Client-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.ppc64",
"7Client-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.ppc64le",
"7Client-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.s390x",
"7Client-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.x86_64",
"7Client-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.aarch64",
"7Client-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.ppc64",
"7Client-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.ppc64le",
"7Client-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.s390x",
"7Client-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.x86_64",
"7Client-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.aarch64",
"7Client-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.ppc64",
"7Client-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.ppc64le",
"7Client-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.s390x",
"7Client-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.x86_64",
"7ComputeNode-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.aarch64",
"7ComputeNode-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.ppc64",
"7ComputeNode-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.ppc64le",
"7ComputeNode-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.s390x",
"7ComputeNode-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.src",
"7ComputeNode-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.x86_64",
"7ComputeNode-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.aarch64",
"7ComputeNode-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.ppc64",
"7ComputeNode-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.ppc64le",
"7ComputeNode-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.s390x",
"7ComputeNode-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.x86_64",
"7ComputeNode-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.aarch64",
"7ComputeNode-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.ppc64",
"7ComputeNode-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.ppc64le",
"7ComputeNode-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.s390x",
"7ComputeNode-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.x86_64",
"7ComputeNode-optional-7.3.Z:httpd-manual-0:2.4.6-45.el7_3.4.noarch",
"7ComputeNode-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.aarch64",
"7ComputeNode-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.ppc64",
"7ComputeNode-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.ppc64le",
"7ComputeNode-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.s390x",
"7ComputeNode-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.x86_64",
"7ComputeNode-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.aarch64",
"7ComputeNode-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.ppc64",
"7ComputeNode-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.ppc64le",
"7ComputeNode-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.s390x",
"7ComputeNode-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.x86_64",
"7ComputeNode-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.aarch64",
"7ComputeNode-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.ppc64",
"7ComputeNode-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.ppc64le",
"7ComputeNode-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.s390x",
"7ComputeNode-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.x86_64",
"7ComputeNode-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.aarch64",
"7ComputeNode-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.ppc64",
"7ComputeNode-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.ppc64le",
"7ComputeNode-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.s390x",
"7ComputeNode-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.x86_64",
"7ComputeNode-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.aarch64",
"7ComputeNode-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.ppc64",
"7ComputeNode-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.ppc64le",
"7ComputeNode-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.s390x",
"7ComputeNode-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.x86_64",
"7Server-7.3.Z:httpd-0:2.4.6-45.el7_3.4.aarch64",
"7Server-7.3.Z:httpd-0:2.4.6-45.el7_3.4.ppc64",
"7Server-7.3.Z:httpd-0:2.4.6-45.el7_3.4.ppc64le",
"7Server-7.3.Z:httpd-0:2.4.6-45.el7_3.4.s390x",
"7Server-7.3.Z:httpd-0:2.4.6-45.el7_3.4.src",
"7Server-7.3.Z:httpd-0:2.4.6-45.el7_3.4.x86_64",
"7Server-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.aarch64",
"7Server-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.ppc64",
"7Server-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.ppc64le",
"7Server-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.s390x",
"7Server-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.x86_64",
"7Server-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.aarch64",
"7Server-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.ppc64",
"7Server-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.ppc64le",
"7Server-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.s390x",
"7Server-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.x86_64",
"7Server-7.3.Z:httpd-manual-0:2.4.6-45.el7_3.4.noarch",
"7Server-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.aarch64",
"7Server-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.ppc64",
"7Server-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.ppc64le",
"7Server-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.s390x",
"7Server-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.x86_64",
"7Server-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.aarch64",
"7Server-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.ppc64",
"7Server-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.ppc64le",
"7Server-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.s390x",
"7Server-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.x86_64",
"7Server-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.aarch64",
"7Server-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.ppc64",
"7Server-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.ppc64le",
"7Server-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.s390x",
"7Server-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.x86_64",
"7Server-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.aarch64",
"7Server-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.ppc64",
"7Server-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.ppc64le",
"7Server-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.s390x",
"7Server-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.x86_64",
"7Server-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.aarch64",
"7Server-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.ppc64",
"7Server-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.ppc64le",
"7Server-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.s390x",
"7Server-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.x86_64",
"7Server-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.aarch64",
"7Server-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.ppc64",
"7Server-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.ppc64le",
"7Server-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.s390x",
"7Server-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.src",
"7Server-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.x86_64",
"7Server-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.aarch64",
"7Server-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.ppc64",
"7Server-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.ppc64le",
"7Server-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.s390x",
"7Server-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.x86_64",
"7Server-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.aarch64",
"7Server-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.ppc64",
"7Server-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.ppc64le",
"7Server-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.s390x",
"7Server-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.x86_64",
"7Server-optional-7.3.Z:httpd-manual-0:2.4.6-45.el7_3.4.noarch",
"7Server-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.aarch64",
"7Server-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.ppc64",
"7Server-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.ppc64le",
"7Server-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.s390x",
"7Server-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.x86_64",
"7Server-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.aarch64",
"7Server-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.ppc64",
"7Server-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.ppc64le",
"7Server-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.s390x",
"7Server-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.x86_64",
"7Server-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.aarch64",
"7Server-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.ppc64",
"7Server-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.ppc64le",
"7Server-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.s390x",
"7Server-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.x86_64",
"7Server-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.aarch64",
"7Server-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.ppc64",
"7Server-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.ppc64le",
"7Server-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.s390x",
"7Server-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.x86_64",
"7Server-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.aarch64",
"7Server-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.ppc64",
"7Server-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.ppc64le",
"7Server-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.s390x",
"7Server-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.x86_64",
"7Workstation-7.3.Z:httpd-0:2.4.6-45.el7_3.4.aarch64",
"7Workstation-7.3.Z:httpd-0:2.4.6-45.el7_3.4.ppc64",
"7Workstation-7.3.Z:httpd-0:2.4.6-45.el7_3.4.ppc64le",
"7Workstation-7.3.Z:httpd-0:2.4.6-45.el7_3.4.s390x",
"7Workstation-7.3.Z:httpd-0:2.4.6-45.el7_3.4.src",
"7Workstation-7.3.Z:httpd-0:2.4.6-45.el7_3.4.x86_64",
"7Workstation-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.aarch64",
"7Workstation-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.ppc64",
"7Workstation-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.ppc64le",
"7Workstation-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.s390x",
"7Workstation-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.x86_64",
"7Workstation-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.aarch64",
"7Workstation-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.ppc64",
"7Workstation-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.ppc64le",
"7Workstation-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.s390x",
"7Workstation-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.x86_64",
"7Workstation-7.3.Z:httpd-manual-0:2.4.6-45.el7_3.4.noarch",
"7Workstation-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.aarch64",
"7Workstation-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.ppc64",
"7Workstation-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.ppc64le",
"7Workstation-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.s390x",
"7Workstation-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.x86_64",
"7Workstation-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.aarch64",
"7Workstation-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.ppc64",
"7Workstation-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.ppc64le",
"7Workstation-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.s390x",
"7Workstation-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.x86_64",
"7Workstation-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.aarch64",
"7Workstation-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.ppc64",
"7Workstation-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.ppc64le",
"7Workstation-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.s390x",
"7Workstation-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.x86_64",
"7Workstation-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.aarch64",
"7Workstation-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.ppc64",
"7Workstation-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.ppc64le",
"7Workstation-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.s390x",
"7Workstation-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.x86_64",
"7Workstation-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.aarch64",
"7Workstation-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.ppc64",
"7Workstation-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.ppc64le",
"7Workstation-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.s390x",
"7Workstation-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.x86_64",
"7Workstation-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.aarch64",
"7Workstation-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.ppc64",
"7Workstation-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.ppc64le",
"7Workstation-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.s390x",
"7Workstation-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.src",
"7Workstation-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.x86_64",
"7Workstation-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.aarch64",
"7Workstation-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.ppc64",
"7Workstation-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.ppc64le",
"7Workstation-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.s390x",
"7Workstation-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.x86_64",
"7Workstation-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.aarch64",
"7Workstation-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.ppc64",
"7Workstation-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.ppc64le",
"7Workstation-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.s390x",
"7Workstation-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.x86_64",
"7Workstation-optional-7.3.Z:httpd-manual-0:2.4.6-45.el7_3.4.noarch",
"7Workstation-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.aarch64",
"7Workstation-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.ppc64",
"7Workstation-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.ppc64le",
"7Workstation-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.s390x",
"7Workstation-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.x86_64",
"7Workstation-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.aarch64",
"7Workstation-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.ppc64",
"7Workstation-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.ppc64le",
"7Workstation-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.s390x",
"7Workstation-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.x86_64",
"7Workstation-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.aarch64",
"7Workstation-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.ppc64",
"7Workstation-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.ppc64le",
"7Workstation-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.s390x",
"7Workstation-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.x86_64",
"7Workstation-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.aarch64",
"7Workstation-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.ppc64",
"7Workstation-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.ppc64le",
"7Workstation-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.s390x",
"7Workstation-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.x86_64",
"7Workstation-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.aarch64",
"7Workstation-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.ppc64",
"7Workstation-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.ppc64le",
"7Workstation-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.s390x",
"7Workstation-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "httpd: DoS vulnerability in mod_auth_digest"
},
{
"cve": "CVE-2016-4975",
"cwe": {
"id": "CWE-113",
"name": "Improper Neutralization of CRLF Sequences in HTTP Headers (\u0027HTTP Request/Response Splitting\u0027)"
},
"discovery_date": "2016-09-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1375968"
}
],
"notes": [
{
"category": "description",
"text": "It was found that Apache was vulnerable to a HTTP response splitting attack for sites which use mod_userdir. An attacker could use this flaw to inject CRLF characters into the HTTP header and could possibly gain access to secure data.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "httpd: CRLF injection allowing HTTP response splitting attacks for sites which use mod_userdir",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Client-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.aarch64",
"7Client-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.ppc64",
"7Client-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.ppc64le",
"7Client-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.s390x",
"7Client-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.src",
"7Client-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.x86_64",
"7Client-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.aarch64",
"7Client-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.ppc64",
"7Client-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.ppc64le",
"7Client-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.s390x",
"7Client-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.x86_64",
"7Client-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.aarch64",
"7Client-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.ppc64",
"7Client-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.ppc64le",
"7Client-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.s390x",
"7Client-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.x86_64",
"7Client-optional-7.3.Z:httpd-manual-0:2.4.6-45.el7_3.4.noarch",
"7Client-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.aarch64",
"7Client-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.ppc64",
"7Client-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.ppc64le",
"7Client-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.s390x",
"7Client-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.x86_64",
"7Client-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.aarch64",
"7Client-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.ppc64",
"7Client-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.ppc64le",
"7Client-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.s390x",
"7Client-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.x86_64",
"7Client-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.aarch64",
"7Client-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.ppc64",
"7Client-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.ppc64le",
"7Client-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.s390x",
"7Client-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.x86_64",
"7Client-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.aarch64",
"7Client-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.ppc64",
"7Client-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.ppc64le",
"7Client-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.s390x",
"7Client-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.x86_64",
"7Client-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.aarch64",
"7Client-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.ppc64",
"7Client-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.ppc64le",
"7Client-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.s390x",
"7Client-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.x86_64",
"7ComputeNode-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.aarch64",
"7ComputeNode-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.ppc64",
"7ComputeNode-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.ppc64le",
"7ComputeNode-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.s390x",
"7ComputeNode-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.src",
"7ComputeNode-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.x86_64",
"7ComputeNode-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.aarch64",
"7ComputeNode-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.ppc64",
"7ComputeNode-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.ppc64le",
"7ComputeNode-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.s390x",
"7ComputeNode-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.x86_64",
"7ComputeNode-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.aarch64",
"7ComputeNode-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.ppc64",
"7ComputeNode-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.ppc64le",
"7ComputeNode-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.s390x",
"7ComputeNode-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.x86_64",
"7ComputeNode-optional-7.3.Z:httpd-manual-0:2.4.6-45.el7_3.4.noarch",
"7ComputeNode-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.aarch64",
"7ComputeNode-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.ppc64",
"7ComputeNode-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.ppc64le",
"7ComputeNode-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.s390x",
"7ComputeNode-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.x86_64",
"7ComputeNode-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.aarch64",
"7ComputeNode-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.ppc64",
"7ComputeNode-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.ppc64le",
"7ComputeNode-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.s390x",
"7ComputeNode-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.x86_64",
"7ComputeNode-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.aarch64",
"7ComputeNode-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.ppc64",
"7ComputeNode-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.ppc64le",
"7ComputeNode-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.s390x",
"7ComputeNode-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.x86_64",
"7ComputeNode-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.aarch64",
"7ComputeNode-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.ppc64",
"7ComputeNode-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.ppc64le",
"7ComputeNode-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.s390x",
"7ComputeNode-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.x86_64",
"7ComputeNode-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.aarch64",
"7ComputeNode-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.ppc64",
"7ComputeNode-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.ppc64le",
"7ComputeNode-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.s390x",
"7ComputeNode-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.x86_64",
"7Server-7.3.Z:httpd-0:2.4.6-45.el7_3.4.aarch64",
"7Server-7.3.Z:httpd-0:2.4.6-45.el7_3.4.ppc64",
"7Server-7.3.Z:httpd-0:2.4.6-45.el7_3.4.ppc64le",
"7Server-7.3.Z:httpd-0:2.4.6-45.el7_3.4.s390x",
"7Server-7.3.Z:httpd-0:2.4.6-45.el7_3.4.src",
"7Server-7.3.Z:httpd-0:2.4.6-45.el7_3.4.x86_64",
"7Server-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.aarch64",
"7Server-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.ppc64",
"7Server-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.ppc64le",
"7Server-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.s390x",
"7Server-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.x86_64",
"7Server-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.aarch64",
"7Server-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.ppc64",
"7Server-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.ppc64le",
"7Server-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.s390x",
"7Server-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.x86_64",
"7Server-7.3.Z:httpd-manual-0:2.4.6-45.el7_3.4.noarch",
"7Server-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.aarch64",
"7Server-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.ppc64",
"7Server-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.ppc64le",
"7Server-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.s390x",
"7Server-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.x86_64",
"7Server-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.aarch64",
"7Server-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.ppc64",
"7Server-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.ppc64le",
"7Server-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.s390x",
"7Server-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.x86_64",
"7Server-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.aarch64",
"7Server-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.ppc64",
"7Server-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.ppc64le",
"7Server-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.s390x",
"7Server-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.x86_64",
"7Server-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.aarch64",
"7Server-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.ppc64",
"7Server-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.ppc64le",
"7Server-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.s390x",
"7Server-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.x86_64",
"7Server-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.aarch64",
"7Server-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.ppc64",
"7Server-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.ppc64le",
"7Server-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.s390x",
"7Server-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.x86_64",
"7Server-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.aarch64",
"7Server-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.ppc64",
"7Server-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.ppc64le",
"7Server-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.s390x",
"7Server-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.src",
"7Server-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.x86_64",
"7Server-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.aarch64",
"7Server-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.ppc64",
"7Server-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.ppc64le",
"7Server-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.s390x",
"7Server-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.x86_64",
"7Server-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.aarch64",
"7Server-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.ppc64",
"7Server-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.ppc64le",
"7Server-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.s390x",
"7Server-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.x86_64",
"7Server-optional-7.3.Z:httpd-manual-0:2.4.6-45.el7_3.4.noarch",
"7Server-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.aarch64",
"7Server-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.ppc64",
"7Server-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.ppc64le",
"7Server-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.s390x",
"7Server-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.x86_64",
"7Server-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.aarch64",
"7Server-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.ppc64",
"7Server-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.ppc64le",
"7Server-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.s390x",
"7Server-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.x86_64",
"7Server-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.aarch64",
"7Server-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.ppc64",
"7Server-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.ppc64le",
"7Server-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.s390x",
"7Server-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.x86_64",
"7Server-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.aarch64",
"7Server-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.ppc64",
"7Server-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.ppc64le",
"7Server-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.s390x",
"7Server-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.x86_64",
"7Server-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.aarch64",
"7Server-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.ppc64",
"7Server-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.ppc64le",
"7Server-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.s390x",
"7Server-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.x86_64",
"7Workstation-7.3.Z:httpd-0:2.4.6-45.el7_3.4.aarch64",
"7Workstation-7.3.Z:httpd-0:2.4.6-45.el7_3.4.ppc64",
"7Workstation-7.3.Z:httpd-0:2.4.6-45.el7_3.4.ppc64le",
"7Workstation-7.3.Z:httpd-0:2.4.6-45.el7_3.4.s390x",
"7Workstation-7.3.Z:httpd-0:2.4.6-45.el7_3.4.src",
"7Workstation-7.3.Z:httpd-0:2.4.6-45.el7_3.4.x86_64",
"7Workstation-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.aarch64",
"7Workstation-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.ppc64",
"7Workstation-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.ppc64le",
"7Workstation-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.s390x",
"7Workstation-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.x86_64",
"7Workstation-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.aarch64",
"7Workstation-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.ppc64",
"7Workstation-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.ppc64le",
"7Workstation-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.s390x",
"7Workstation-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.x86_64",
"7Workstation-7.3.Z:httpd-manual-0:2.4.6-45.el7_3.4.noarch",
"7Workstation-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.aarch64",
"7Workstation-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.ppc64",
"7Workstation-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.ppc64le",
"7Workstation-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.s390x",
"7Workstation-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.x86_64",
"7Workstation-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.aarch64",
"7Workstation-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.ppc64",
"7Workstation-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.ppc64le",
"7Workstation-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.s390x",
"7Workstation-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.x86_64",
"7Workstation-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.aarch64",
"7Workstation-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.ppc64",
"7Workstation-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.ppc64le",
"7Workstation-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.s390x",
"7Workstation-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.x86_64",
"7Workstation-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.aarch64",
"7Workstation-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.ppc64",
"7Workstation-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.ppc64le",
"7Workstation-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.s390x",
"7Workstation-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.x86_64",
"7Workstation-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.aarch64",
"7Workstation-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.ppc64",
"7Workstation-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.ppc64le",
"7Workstation-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.s390x",
"7Workstation-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.x86_64",
"7Workstation-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.aarch64",
"7Workstation-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.ppc64",
"7Workstation-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.ppc64le",
"7Workstation-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.s390x",
"7Workstation-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.src",
"7Workstation-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.x86_64",
"7Workstation-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.aarch64",
"7Workstation-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.ppc64",
"7Workstation-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.ppc64le",
"7Workstation-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.s390x",
"7Workstation-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.x86_64",
"7Workstation-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.aarch64",
"7Workstation-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.ppc64",
"7Workstation-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.ppc64le",
"7Workstation-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.s390x",
"7Workstation-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.x86_64",
"7Workstation-optional-7.3.Z:httpd-manual-0:2.4.6-45.el7_3.4.noarch",
"7Workstation-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.aarch64",
"7Workstation-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.ppc64",
"7Workstation-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.ppc64le",
"7Workstation-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.s390x",
"7Workstation-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.x86_64",
"7Workstation-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.aarch64",
"7Workstation-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.ppc64",
"7Workstation-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.ppc64le",
"7Workstation-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.s390x",
"7Workstation-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.x86_64",
"7Workstation-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.aarch64",
"7Workstation-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.ppc64",
"7Workstation-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.ppc64le",
"7Workstation-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.s390x",
"7Workstation-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.x86_64",
"7Workstation-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.aarch64",
"7Workstation-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.ppc64",
"7Workstation-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.ppc64le",
"7Workstation-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.s390x",
"7Workstation-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.x86_64",
"7Workstation-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.aarch64",
"7Workstation-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.ppc64",
"7Workstation-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.ppc64le",
"7Workstation-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.s390x",
"7Workstation-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2016-4975"
},
{
"category": "external",
"summary": "RHBZ#1375968",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1375968"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2016-4975",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-4975"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-4975",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2016-4975"
},
{
"category": "external",
"summary": "https://httpd.apache.org/security/vulnerabilities_22.html#CVE-2016-4975",
"url": "https://httpd.apache.org/security/vulnerabilities_22.html#CVE-2016-4975"
},
{
"category": "external",
"summary": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2016-4975",
"url": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2016-4975"
}
],
"release_date": "2018-08-14T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2017-04-12T12:24:45+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically.",
"product_ids": [
"7Client-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.aarch64",
"7Client-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.ppc64",
"7Client-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.ppc64le",
"7Client-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.s390x",
"7Client-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.src",
"7Client-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.x86_64",
"7Client-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.aarch64",
"7Client-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.ppc64",
"7Client-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.ppc64le",
"7Client-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.s390x",
"7Client-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.x86_64",
"7Client-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.aarch64",
"7Client-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.ppc64",
"7Client-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.ppc64le",
"7Client-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.s390x",
"7Client-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.x86_64",
"7Client-optional-7.3.Z:httpd-manual-0:2.4.6-45.el7_3.4.noarch",
"7Client-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.aarch64",
"7Client-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.ppc64",
"7Client-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.ppc64le",
"7Client-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.s390x",
"7Client-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.x86_64",
"7Client-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.aarch64",
"7Client-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.ppc64",
"7Client-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.ppc64le",
"7Client-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.s390x",
"7Client-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.x86_64",
"7Client-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.aarch64",
"7Client-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.ppc64",
"7Client-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.ppc64le",
"7Client-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.s390x",
"7Client-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.x86_64",
"7Client-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.aarch64",
"7Client-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.ppc64",
"7Client-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.ppc64le",
"7Client-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.s390x",
"7Client-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.x86_64",
"7Client-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.aarch64",
"7Client-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.ppc64",
"7Client-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.ppc64le",
"7Client-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.s390x",
"7Client-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.x86_64",
"7ComputeNode-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.aarch64",
"7ComputeNode-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.ppc64",
"7ComputeNode-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.ppc64le",
"7ComputeNode-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.s390x",
"7ComputeNode-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.src",
"7ComputeNode-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.x86_64",
"7ComputeNode-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.aarch64",
"7ComputeNode-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.ppc64",
"7ComputeNode-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.ppc64le",
"7ComputeNode-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.s390x",
"7ComputeNode-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.x86_64",
"7ComputeNode-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.aarch64",
"7ComputeNode-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.ppc64",
"7ComputeNode-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.ppc64le",
"7ComputeNode-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.s390x",
"7ComputeNode-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.x86_64",
"7ComputeNode-optional-7.3.Z:httpd-manual-0:2.4.6-45.el7_3.4.noarch",
"7ComputeNode-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.aarch64",
"7ComputeNode-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.ppc64",
"7ComputeNode-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.ppc64le",
"7ComputeNode-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.s390x",
"7ComputeNode-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.x86_64",
"7ComputeNode-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.aarch64",
"7ComputeNode-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.ppc64",
"7ComputeNode-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.ppc64le",
"7ComputeNode-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.s390x",
"7ComputeNode-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.x86_64",
"7ComputeNode-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.aarch64",
"7ComputeNode-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.ppc64",
"7ComputeNode-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.ppc64le",
"7ComputeNode-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.s390x",
"7ComputeNode-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.x86_64",
"7ComputeNode-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.aarch64",
"7ComputeNode-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.ppc64",
"7ComputeNode-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.ppc64le",
"7ComputeNode-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.s390x",
"7ComputeNode-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.x86_64",
"7ComputeNode-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.aarch64",
"7ComputeNode-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.ppc64",
"7ComputeNode-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.ppc64le",
"7ComputeNode-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.s390x",
"7ComputeNode-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.x86_64",
"7Server-7.3.Z:httpd-0:2.4.6-45.el7_3.4.aarch64",
"7Server-7.3.Z:httpd-0:2.4.6-45.el7_3.4.ppc64",
"7Server-7.3.Z:httpd-0:2.4.6-45.el7_3.4.ppc64le",
"7Server-7.3.Z:httpd-0:2.4.6-45.el7_3.4.s390x",
"7Server-7.3.Z:httpd-0:2.4.6-45.el7_3.4.src",
"7Server-7.3.Z:httpd-0:2.4.6-45.el7_3.4.x86_64",
"7Server-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.aarch64",
"7Server-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.ppc64",
"7Server-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.ppc64le",
"7Server-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.s390x",
"7Server-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.x86_64",
"7Server-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.aarch64",
"7Server-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.ppc64",
"7Server-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.ppc64le",
"7Server-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.s390x",
"7Server-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.x86_64",
"7Server-7.3.Z:httpd-manual-0:2.4.6-45.el7_3.4.noarch",
"7Server-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.aarch64",
"7Server-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.ppc64",
"7Server-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.ppc64le",
"7Server-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.s390x",
"7Server-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.x86_64",
"7Server-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.aarch64",
"7Server-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.ppc64",
"7Server-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.ppc64le",
"7Server-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.s390x",
"7Server-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.x86_64",
"7Server-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.aarch64",
"7Server-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.ppc64",
"7Server-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.ppc64le",
"7Server-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.s390x",
"7Server-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.x86_64",
"7Server-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.aarch64",
"7Server-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.ppc64",
"7Server-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.ppc64le",
"7Server-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.s390x",
"7Server-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.x86_64",
"7Server-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.aarch64",
"7Server-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.ppc64",
"7Server-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.ppc64le",
"7Server-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.s390x",
"7Server-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.x86_64",
"7Server-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.aarch64",
"7Server-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.ppc64",
"7Server-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.ppc64le",
"7Server-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.s390x",
"7Server-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.src",
"7Server-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.x86_64",
"7Server-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.aarch64",
"7Server-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.ppc64",
"7Server-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.ppc64le",
"7Server-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.s390x",
"7Server-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.x86_64",
"7Server-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.aarch64",
"7Server-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.ppc64",
"7Server-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.ppc64le",
"7Server-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.s390x",
"7Server-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.x86_64",
"7Server-optional-7.3.Z:httpd-manual-0:2.4.6-45.el7_3.4.noarch",
"7Server-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.aarch64",
"7Server-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.ppc64",
"7Server-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.ppc64le",
"7Server-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.s390x",
"7Server-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.x86_64",
"7Server-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.aarch64",
"7Server-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.ppc64",
"7Server-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.ppc64le",
"7Server-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.s390x",
"7Server-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.x86_64",
"7Server-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.aarch64",
"7Server-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.ppc64",
"7Server-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.ppc64le",
"7Server-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.s390x",
"7Server-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.x86_64",
"7Server-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.aarch64",
"7Server-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.ppc64",
"7Server-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.ppc64le",
"7Server-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.s390x",
"7Server-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.x86_64",
"7Server-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.aarch64",
"7Server-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.ppc64",
"7Server-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.ppc64le",
"7Server-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.s390x",
"7Server-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.x86_64",
"7Workstation-7.3.Z:httpd-0:2.4.6-45.el7_3.4.aarch64",
"7Workstation-7.3.Z:httpd-0:2.4.6-45.el7_3.4.ppc64",
"7Workstation-7.3.Z:httpd-0:2.4.6-45.el7_3.4.ppc64le",
"7Workstation-7.3.Z:httpd-0:2.4.6-45.el7_3.4.s390x",
"7Workstation-7.3.Z:httpd-0:2.4.6-45.el7_3.4.src",
"7Workstation-7.3.Z:httpd-0:2.4.6-45.el7_3.4.x86_64",
"7Workstation-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.aarch64",
"7Workstation-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.ppc64",
"7Workstation-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.ppc64le",
"7Workstation-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.s390x",
"7Workstation-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.x86_64",
"7Workstation-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.aarch64",
"7Workstation-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.ppc64",
"7Workstation-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.ppc64le",
"7Workstation-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.s390x",
"7Workstation-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.x86_64",
"7Workstation-7.3.Z:httpd-manual-0:2.4.6-45.el7_3.4.noarch",
"7Workstation-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.aarch64",
"7Workstation-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.ppc64",
"7Workstation-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.ppc64le",
"7Workstation-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.s390x",
"7Workstation-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.x86_64",
"7Workstation-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.aarch64",
"7Workstation-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.ppc64",
"7Workstation-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.ppc64le",
"7Workstation-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.s390x",
"7Workstation-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.x86_64",
"7Workstation-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.aarch64",
"7Workstation-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.ppc64",
"7Workstation-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.ppc64le",
"7Workstation-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.s390x",
"7Workstation-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.x86_64",
"7Workstation-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.aarch64",
"7Workstation-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.ppc64",
"7Workstation-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.ppc64le",
"7Workstation-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.s390x",
"7Workstation-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.x86_64",
"7Workstation-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.aarch64",
"7Workstation-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.ppc64",
"7Workstation-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.ppc64le",
"7Workstation-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.s390x",
"7Workstation-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.x86_64",
"7Workstation-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.aarch64",
"7Workstation-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.ppc64",
"7Workstation-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.ppc64le",
"7Workstation-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.s390x",
"7Workstation-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.src",
"7Workstation-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.x86_64",
"7Workstation-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.aarch64",
"7Workstation-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.ppc64",
"7Workstation-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.ppc64le",
"7Workstation-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.s390x",
"7Workstation-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.x86_64",
"7Workstation-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.aarch64",
"7Workstation-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.ppc64",
"7Workstation-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.ppc64le",
"7Workstation-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.s390x",
"7Workstation-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.x86_64",
"7Workstation-optional-7.3.Z:httpd-manual-0:2.4.6-45.el7_3.4.noarch",
"7Workstation-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.aarch64",
"7Workstation-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.ppc64",
"7Workstation-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.ppc64le",
"7Workstation-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.s390x",
"7Workstation-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.x86_64",
"7Workstation-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.aarch64",
"7Workstation-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.ppc64",
"7Workstation-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.ppc64le",
"7Workstation-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.s390x",
"7Workstation-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.x86_64",
"7Workstation-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.aarch64",
"7Workstation-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.ppc64",
"7Workstation-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.ppc64le",
"7Workstation-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.s390x",
"7Workstation-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.x86_64",
"7Workstation-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.aarch64",
"7Workstation-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.ppc64",
"7Workstation-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.ppc64le",
"7Workstation-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.s390x",
"7Workstation-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.x86_64",
"7Workstation-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.aarch64",
"7Workstation-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.ppc64",
"7Workstation-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.ppc64le",
"7Workstation-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.s390x",
"7Workstation-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2017:0906"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 3.7,
"baseSeverity": "LOW",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.0"
},
"products": [
"7Client-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.aarch64",
"7Client-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.ppc64",
"7Client-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.ppc64le",
"7Client-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.s390x",
"7Client-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.src",
"7Client-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.x86_64",
"7Client-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.aarch64",
"7Client-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.ppc64",
"7Client-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.ppc64le",
"7Client-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.s390x",
"7Client-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.x86_64",
"7Client-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.aarch64",
"7Client-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.ppc64",
"7Client-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.ppc64le",
"7Client-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.s390x",
"7Client-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.x86_64",
"7Client-optional-7.3.Z:httpd-manual-0:2.4.6-45.el7_3.4.noarch",
"7Client-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.aarch64",
"7Client-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.ppc64",
"7Client-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.ppc64le",
"7Client-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.s390x",
"7Client-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.x86_64",
"7Client-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.aarch64",
"7Client-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.ppc64",
"7Client-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.ppc64le",
"7Client-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.s390x",
"7Client-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.x86_64",
"7Client-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.aarch64",
"7Client-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.ppc64",
"7Client-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.ppc64le",
"7Client-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.s390x",
"7Client-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.x86_64",
"7Client-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.aarch64",
"7Client-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.ppc64",
"7Client-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.ppc64le",
"7Client-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.s390x",
"7Client-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.x86_64",
"7Client-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.aarch64",
"7Client-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.ppc64",
"7Client-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.ppc64le",
"7Client-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.s390x",
"7Client-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.x86_64",
"7ComputeNode-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.aarch64",
"7ComputeNode-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.ppc64",
"7ComputeNode-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.ppc64le",
"7ComputeNode-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.s390x",
"7ComputeNode-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.src",
"7ComputeNode-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.x86_64",
"7ComputeNode-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.aarch64",
"7ComputeNode-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.ppc64",
"7ComputeNode-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.ppc64le",
"7ComputeNode-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.s390x",
"7ComputeNode-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.x86_64",
"7ComputeNode-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.aarch64",
"7ComputeNode-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.ppc64",
"7ComputeNode-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.ppc64le",
"7ComputeNode-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.s390x",
"7ComputeNode-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.x86_64",
"7ComputeNode-optional-7.3.Z:httpd-manual-0:2.4.6-45.el7_3.4.noarch",
"7ComputeNode-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.aarch64",
"7ComputeNode-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.ppc64",
"7ComputeNode-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.ppc64le",
"7ComputeNode-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.s390x",
"7ComputeNode-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.x86_64",
"7ComputeNode-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.aarch64",
"7ComputeNode-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.ppc64",
"7ComputeNode-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.ppc64le",
"7ComputeNode-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.s390x",
"7ComputeNode-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.x86_64",
"7ComputeNode-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.aarch64",
"7ComputeNode-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.ppc64",
"7ComputeNode-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.ppc64le",
"7ComputeNode-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.s390x",
"7ComputeNode-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.x86_64",
"7ComputeNode-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.aarch64",
"7ComputeNode-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.ppc64",
"7ComputeNode-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.ppc64le",
"7ComputeNode-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.s390x",
"7ComputeNode-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.x86_64",
"7ComputeNode-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.aarch64",
"7ComputeNode-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.ppc64",
"7ComputeNode-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.ppc64le",
"7ComputeNode-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.s390x",
"7ComputeNode-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.x86_64",
"7Server-7.3.Z:httpd-0:2.4.6-45.el7_3.4.aarch64",
"7Server-7.3.Z:httpd-0:2.4.6-45.el7_3.4.ppc64",
"7Server-7.3.Z:httpd-0:2.4.6-45.el7_3.4.ppc64le",
"7Server-7.3.Z:httpd-0:2.4.6-45.el7_3.4.s390x",
"7Server-7.3.Z:httpd-0:2.4.6-45.el7_3.4.src",
"7Server-7.3.Z:httpd-0:2.4.6-45.el7_3.4.x86_64",
"7Server-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.aarch64",
"7Server-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.ppc64",
"7Server-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.ppc64le",
"7Server-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.s390x",
"7Server-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.x86_64",
"7Server-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.aarch64",
"7Server-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.ppc64",
"7Server-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.ppc64le",
"7Server-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.s390x",
"7Server-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.x86_64",
"7Server-7.3.Z:httpd-manual-0:2.4.6-45.el7_3.4.noarch",
"7Server-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.aarch64",
"7Server-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.ppc64",
"7Server-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.ppc64le",
"7Server-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.s390x",
"7Server-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.x86_64",
"7Server-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.aarch64",
"7Server-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.ppc64",
"7Server-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.ppc64le",
"7Server-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.s390x",
"7Server-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.x86_64",
"7Server-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.aarch64",
"7Server-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.ppc64",
"7Server-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.ppc64le",
"7Server-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.s390x",
"7Server-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.x86_64",
"7Server-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.aarch64",
"7Server-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.ppc64",
"7Server-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.ppc64le",
"7Server-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.s390x",
"7Server-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.x86_64",
"7Server-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.aarch64",
"7Server-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.ppc64",
"7Server-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.ppc64le",
"7Server-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.s390x",
"7Server-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.x86_64",
"7Server-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.aarch64",
"7Server-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.ppc64",
"7Server-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.ppc64le",
"7Server-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.s390x",
"7Server-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.src",
"7Server-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.x86_64",
"7Server-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.aarch64",
"7Server-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.ppc64",
"7Server-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.ppc64le",
"7Server-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.s390x",
"7Server-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.x86_64",
"7Server-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.aarch64",
"7Server-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.ppc64",
"7Server-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.ppc64le",
"7Server-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.s390x",
"7Server-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.x86_64",
"7Server-optional-7.3.Z:httpd-manual-0:2.4.6-45.el7_3.4.noarch",
"7Server-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.aarch64",
"7Server-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.ppc64",
"7Server-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.ppc64le",
"7Server-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.s390x",
"7Server-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.x86_64",
"7Server-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.aarch64",
"7Server-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.ppc64",
"7Server-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.ppc64le",
"7Server-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.s390x",
"7Server-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.x86_64",
"7Server-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.aarch64",
"7Server-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.ppc64",
"7Server-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.ppc64le",
"7Server-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.s390x",
"7Server-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.x86_64",
"7Server-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.aarch64",
"7Server-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.ppc64",
"7Server-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.ppc64le",
"7Server-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.s390x",
"7Server-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.x86_64",
"7Server-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.aarch64",
"7Server-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.ppc64",
"7Server-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.ppc64le",
"7Server-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.s390x",
"7Server-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.x86_64",
"7Workstation-7.3.Z:httpd-0:2.4.6-45.el7_3.4.aarch64",
"7Workstation-7.3.Z:httpd-0:2.4.6-45.el7_3.4.ppc64",
"7Workstation-7.3.Z:httpd-0:2.4.6-45.el7_3.4.ppc64le",
"7Workstation-7.3.Z:httpd-0:2.4.6-45.el7_3.4.s390x",
"7Workstation-7.3.Z:httpd-0:2.4.6-45.el7_3.4.src",
"7Workstation-7.3.Z:httpd-0:2.4.6-45.el7_3.4.x86_64",
"7Workstation-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.aarch64",
"7Workstation-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.ppc64",
"7Workstation-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.ppc64le",
"7Workstation-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.s390x",
"7Workstation-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.x86_64",
"7Workstation-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.aarch64",
"7Workstation-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.ppc64",
"7Workstation-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.ppc64le",
"7Workstation-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.s390x",
"7Workstation-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.x86_64",
"7Workstation-7.3.Z:httpd-manual-0:2.4.6-45.el7_3.4.noarch",
"7Workstation-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.aarch64",
"7Workstation-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.ppc64",
"7Workstation-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.ppc64le",
"7Workstation-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.s390x",
"7Workstation-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.x86_64",
"7Workstation-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.aarch64",
"7Workstation-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.ppc64",
"7Workstation-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.ppc64le",
"7Workstation-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.s390x",
"7Workstation-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.x86_64",
"7Workstation-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.aarch64",
"7Workstation-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.ppc64",
"7Workstation-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.ppc64le",
"7Workstation-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.s390x",
"7Workstation-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.x86_64",
"7Workstation-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.aarch64",
"7Workstation-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.ppc64",
"7Workstation-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.ppc64le",
"7Workstation-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.s390x",
"7Workstation-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.x86_64",
"7Workstation-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.aarch64",
"7Workstation-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.ppc64",
"7Workstation-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.ppc64le",
"7Workstation-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.s390x",
"7Workstation-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.x86_64",
"7Workstation-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.aarch64",
"7Workstation-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.ppc64",
"7Workstation-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.ppc64le",
"7Workstation-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.s390x",
"7Workstation-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.src",
"7Workstation-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.x86_64",
"7Workstation-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.aarch64",
"7Workstation-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.ppc64",
"7Workstation-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.ppc64le",
"7Workstation-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.s390x",
"7Workstation-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.x86_64",
"7Workstation-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.aarch64",
"7Workstation-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.ppc64",
"7Workstation-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.ppc64le",
"7Workstation-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.s390x",
"7Workstation-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.x86_64",
"7Workstation-optional-7.3.Z:httpd-manual-0:2.4.6-45.el7_3.4.noarch",
"7Workstation-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.aarch64",
"7Workstation-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.ppc64",
"7Workstation-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.ppc64le",
"7Workstation-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.s390x",
"7Workstation-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.x86_64",
"7Workstation-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.aarch64",
"7Workstation-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.ppc64",
"7Workstation-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.ppc64le",
"7Workstation-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.s390x",
"7Workstation-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.x86_64",
"7Workstation-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.aarch64",
"7Workstation-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.ppc64",
"7Workstation-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.ppc64le",
"7Workstation-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.s390x",
"7Workstation-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.x86_64",
"7Workstation-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.aarch64",
"7Workstation-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.ppc64",
"7Workstation-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.ppc64le",
"7Workstation-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.s390x",
"7Workstation-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.x86_64",
"7Workstation-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.aarch64",
"7Workstation-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.ppc64",
"7Workstation-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.ppc64le",
"7Workstation-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.s390x",
"7Workstation-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "httpd: CRLF injection allowing HTTP response splitting attacks for sites which use mod_userdir"
},
{
"cve": "CVE-2016-8743",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"discovery_date": "2016-12-20T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1406822"
}
],
"notes": [
{
"category": "description",
"text": "It was discovered that the HTTP parser in httpd incorrectly allowed certain characters not permitted by the HTTP protocol specification to appear unencoded in HTTP request headers. If httpd was used in conjunction with a proxy or backend server that interpreted those characters differently, a remote attacker could possibly use this flaw to inject data into HTTP responses, resulting in proxy cache poisoning.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "httpd: Apache HTTP Request Parsing Whitespace Defects",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Client-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.aarch64",
"7Client-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.ppc64",
"7Client-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.ppc64le",
"7Client-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.s390x",
"7Client-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.src",
"7Client-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.x86_64",
"7Client-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.aarch64",
"7Client-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.ppc64",
"7Client-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.ppc64le",
"7Client-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.s390x",
"7Client-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.x86_64",
"7Client-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.aarch64",
"7Client-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.ppc64",
"7Client-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.ppc64le",
"7Client-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.s390x",
"7Client-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.x86_64",
"7Client-optional-7.3.Z:httpd-manual-0:2.4.6-45.el7_3.4.noarch",
"7Client-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.aarch64",
"7Client-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.ppc64",
"7Client-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.ppc64le",
"7Client-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.s390x",
"7Client-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.x86_64",
"7Client-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.aarch64",
"7Client-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.ppc64",
"7Client-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.ppc64le",
"7Client-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.s390x",
"7Client-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.x86_64",
"7Client-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.aarch64",
"7Client-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.ppc64",
"7Client-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.ppc64le",
"7Client-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.s390x",
"7Client-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.x86_64",
"7Client-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.aarch64",
"7Client-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.ppc64",
"7Client-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.ppc64le",
"7Client-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.s390x",
"7Client-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.x86_64",
"7Client-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.aarch64",
"7Client-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.ppc64",
"7Client-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.ppc64le",
"7Client-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.s390x",
"7Client-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.x86_64",
"7ComputeNode-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.aarch64",
"7ComputeNode-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.ppc64",
"7ComputeNode-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.ppc64le",
"7ComputeNode-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.s390x",
"7ComputeNode-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.src",
"7ComputeNode-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.x86_64",
"7ComputeNode-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.aarch64",
"7ComputeNode-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.ppc64",
"7ComputeNode-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.ppc64le",
"7ComputeNode-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.s390x",
"7ComputeNode-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.x86_64",
"7ComputeNode-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.aarch64",
"7ComputeNode-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.ppc64",
"7ComputeNode-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.ppc64le",
"7ComputeNode-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.s390x",
"7ComputeNode-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.x86_64",
"7ComputeNode-optional-7.3.Z:httpd-manual-0:2.4.6-45.el7_3.4.noarch",
"7ComputeNode-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.aarch64",
"7ComputeNode-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.ppc64",
"7ComputeNode-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.ppc64le",
"7ComputeNode-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.s390x",
"7ComputeNode-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.x86_64",
"7ComputeNode-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.aarch64",
"7ComputeNode-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.ppc64",
"7ComputeNode-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.ppc64le",
"7ComputeNode-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.s390x",
"7ComputeNode-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.x86_64",
"7ComputeNode-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.aarch64",
"7ComputeNode-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.ppc64",
"7ComputeNode-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.ppc64le",
"7ComputeNode-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.s390x",
"7ComputeNode-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.x86_64",
"7ComputeNode-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.aarch64",
"7ComputeNode-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.ppc64",
"7ComputeNode-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.ppc64le",
"7ComputeNode-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.s390x",
"7ComputeNode-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.x86_64",
"7ComputeNode-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.aarch64",
"7ComputeNode-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.ppc64",
"7ComputeNode-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.ppc64le",
"7ComputeNode-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.s390x",
"7ComputeNode-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.x86_64",
"7Server-7.3.Z:httpd-0:2.4.6-45.el7_3.4.aarch64",
"7Server-7.3.Z:httpd-0:2.4.6-45.el7_3.4.ppc64",
"7Server-7.3.Z:httpd-0:2.4.6-45.el7_3.4.ppc64le",
"7Server-7.3.Z:httpd-0:2.4.6-45.el7_3.4.s390x",
"7Server-7.3.Z:httpd-0:2.4.6-45.el7_3.4.src",
"7Server-7.3.Z:httpd-0:2.4.6-45.el7_3.4.x86_64",
"7Server-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.aarch64",
"7Server-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.ppc64",
"7Server-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.ppc64le",
"7Server-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.s390x",
"7Server-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.x86_64",
"7Server-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.aarch64",
"7Server-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.ppc64",
"7Server-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.ppc64le",
"7Server-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.s390x",
"7Server-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.x86_64",
"7Server-7.3.Z:httpd-manual-0:2.4.6-45.el7_3.4.noarch",
"7Server-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.aarch64",
"7Server-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.ppc64",
"7Server-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.ppc64le",
"7Server-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.s390x",
"7Server-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.x86_64",
"7Server-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.aarch64",
"7Server-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.ppc64",
"7Server-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.ppc64le",
"7Server-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.s390x",
"7Server-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.x86_64",
"7Server-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.aarch64",
"7Server-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.ppc64",
"7Server-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.ppc64le",
"7Server-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.s390x",
"7Server-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.x86_64",
"7Server-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.aarch64",
"7Server-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.ppc64",
"7Server-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.ppc64le",
"7Server-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.s390x",
"7Server-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.x86_64",
"7Server-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.aarch64",
"7Server-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.ppc64",
"7Server-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.ppc64le",
"7Server-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.s390x",
"7Server-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.x86_64",
"7Server-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.aarch64",
"7Server-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.ppc64",
"7Server-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.ppc64le",
"7Server-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.s390x",
"7Server-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.src",
"7Server-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.x86_64",
"7Server-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.aarch64",
"7Server-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.ppc64",
"7Server-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.ppc64le",
"7Server-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.s390x",
"7Server-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.x86_64",
"7Server-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.aarch64",
"7Server-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.ppc64",
"7Server-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.ppc64le",
"7Server-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.s390x",
"7Server-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.x86_64",
"7Server-optional-7.3.Z:httpd-manual-0:2.4.6-45.el7_3.4.noarch",
"7Server-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.aarch64",
"7Server-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.ppc64",
"7Server-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.ppc64le",
"7Server-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.s390x",
"7Server-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.x86_64",
"7Server-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.aarch64",
"7Server-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.ppc64",
"7Server-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.ppc64le",
"7Server-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.s390x",
"7Server-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.x86_64",
"7Server-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.aarch64",
"7Server-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.ppc64",
"7Server-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.ppc64le",
"7Server-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.s390x",
"7Server-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.x86_64",
"7Server-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.aarch64",
"7Server-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.ppc64",
"7Server-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.ppc64le",
"7Server-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.s390x",
"7Server-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.x86_64",
"7Server-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.aarch64",
"7Server-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.ppc64",
"7Server-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.ppc64le",
"7Server-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.s390x",
"7Server-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.x86_64",
"7Workstation-7.3.Z:httpd-0:2.4.6-45.el7_3.4.aarch64",
"7Workstation-7.3.Z:httpd-0:2.4.6-45.el7_3.4.ppc64",
"7Workstation-7.3.Z:httpd-0:2.4.6-45.el7_3.4.ppc64le",
"7Workstation-7.3.Z:httpd-0:2.4.6-45.el7_3.4.s390x",
"7Workstation-7.3.Z:httpd-0:2.4.6-45.el7_3.4.src",
"7Workstation-7.3.Z:httpd-0:2.4.6-45.el7_3.4.x86_64",
"7Workstation-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.aarch64",
"7Workstation-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.ppc64",
"7Workstation-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.ppc64le",
"7Workstation-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.s390x",
"7Workstation-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.x86_64",
"7Workstation-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.aarch64",
"7Workstation-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.ppc64",
"7Workstation-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.ppc64le",
"7Workstation-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.s390x",
"7Workstation-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.x86_64",
"7Workstation-7.3.Z:httpd-manual-0:2.4.6-45.el7_3.4.noarch",
"7Workstation-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.aarch64",
"7Workstation-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.ppc64",
"7Workstation-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.ppc64le",
"7Workstation-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.s390x",
"7Workstation-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.x86_64",
"7Workstation-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.aarch64",
"7Workstation-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.ppc64",
"7Workstation-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.ppc64le",
"7Workstation-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.s390x",
"7Workstation-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.x86_64",
"7Workstation-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.aarch64",
"7Workstation-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.ppc64",
"7Workstation-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.ppc64le",
"7Workstation-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.s390x",
"7Workstation-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.x86_64",
"7Workstation-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.aarch64",
"7Workstation-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.ppc64",
"7Workstation-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.ppc64le",
"7Workstation-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.s390x",
"7Workstation-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.x86_64",
"7Workstation-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.aarch64",
"7Workstation-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.ppc64",
"7Workstation-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.ppc64le",
"7Workstation-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.s390x",
"7Workstation-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.x86_64",
"7Workstation-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.aarch64",
"7Workstation-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.ppc64",
"7Workstation-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.ppc64le",
"7Workstation-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.s390x",
"7Workstation-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.src",
"7Workstation-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.x86_64",
"7Workstation-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.aarch64",
"7Workstation-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.ppc64",
"7Workstation-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.ppc64le",
"7Workstation-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.s390x",
"7Workstation-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.x86_64",
"7Workstation-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.aarch64",
"7Workstation-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.ppc64",
"7Workstation-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.ppc64le",
"7Workstation-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.s390x",
"7Workstation-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.x86_64",
"7Workstation-optional-7.3.Z:httpd-manual-0:2.4.6-45.el7_3.4.noarch",
"7Workstation-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.aarch64",
"7Workstation-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.ppc64",
"7Workstation-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.ppc64le",
"7Workstation-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.s390x",
"7Workstation-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.x86_64",
"7Workstation-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.aarch64",
"7Workstation-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.ppc64",
"7Workstation-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.ppc64le",
"7Workstation-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.s390x",
"7Workstation-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.x86_64",
"7Workstation-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.aarch64",
"7Workstation-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.ppc64",
"7Workstation-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.ppc64le",
"7Workstation-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.s390x",
"7Workstation-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.x86_64",
"7Workstation-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.aarch64",
"7Workstation-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.ppc64",
"7Workstation-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.ppc64le",
"7Workstation-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.s390x",
"7Workstation-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.x86_64",
"7Workstation-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.aarch64",
"7Workstation-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.ppc64",
"7Workstation-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.ppc64le",
"7Workstation-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.s390x",
"7Workstation-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2016-8743"
},
{
"category": "external",
"summary": "RHBZ#1406822",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1406822"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2016-8743",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-8743"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-8743",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2016-8743"
},
{
"category": "external",
"summary": "https://httpd.apache.org/security/vulnerabilities_24.html#2.4.25",
"url": "https://httpd.apache.org/security/vulnerabilities_24.html#2.4.25"
}
],
"release_date": "2016-12-20T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2017-04-12T12:24:45+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically.",
"product_ids": [
"7Client-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.aarch64",
"7Client-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.ppc64",
"7Client-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.ppc64le",
"7Client-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.s390x",
"7Client-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.src",
"7Client-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.x86_64",
"7Client-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.aarch64",
"7Client-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.ppc64",
"7Client-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.ppc64le",
"7Client-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.s390x",
"7Client-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.x86_64",
"7Client-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.aarch64",
"7Client-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.ppc64",
"7Client-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.ppc64le",
"7Client-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.s390x",
"7Client-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.x86_64",
"7Client-optional-7.3.Z:httpd-manual-0:2.4.6-45.el7_3.4.noarch",
"7Client-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.aarch64",
"7Client-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.ppc64",
"7Client-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.ppc64le",
"7Client-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.s390x",
"7Client-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.x86_64",
"7Client-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.aarch64",
"7Client-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.ppc64",
"7Client-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.ppc64le",
"7Client-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.s390x",
"7Client-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.x86_64",
"7Client-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.aarch64",
"7Client-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.ppc64",
"7Client-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.ppc64le",
"7Client-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.s390x",
"7Client-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.x86_64",
"7Client-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.aarch64",
"7Client-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.ppc64",
"7Client-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.ppc64le",
"7Client-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.s390x",
"7Client-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.x86_64",
"7Client-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.aarch64",
"7Client-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.ppc64",
"7Client-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.ppc64le",
"7Client-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.s390x",
"7Client-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.x86_64",
"7ComputeNode-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.aarch64",
"7ComputeNode-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.ppc64",
"7ComputeNode-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.ppc64le",
"7ComputeNode-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.s390x",
"7ComputeNode-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.src",
"7ComputeNode-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.x86_64",
"7ComputeNode-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.aarch64",
"7ComputeNode-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.ppc64",
"7ComputeNode-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.ppc64le",
"7ComputeNode-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.s390x",
"7ComputeNode-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.x86_64",
"7ComputeNode-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.aarch64",
"7ComputeNode-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.ppc64",
"7ComputeNode-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.ppc64le",
"7ComputeNode-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.s390x",
"7ComputeNode-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.x86_64",
"7ComputeNode-optional-7.3.Z:httpd-manual-0:2.4.6-45.el7_3.4.noarch",
"7ComputeNode-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.aarch64",
"7ComputeNode-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.ppc64",
"7ComputeNode-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.ppc64le",
"7ComputeNode-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.s390x",
"7ComputeNode-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.x86_64",
"7ComputeNode-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.aarch64",
"7ComputeNode-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.ppc64",
"7ComputeNode-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.ppc64le",
"7ComputeNode-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.s390x",
"7ComputeNode-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.x86_64",
"7ComputeNode-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.aarch64",
"7ComputeNode-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.ppc64",
"7ComputeNode-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.ppc64le",
"7ComputeNode-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.s390x",
"7ComputeNode-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.x86_64",
"7ComputeNode-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.aarch64",
"7ComputeNode-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.ppc64",
"7ComputeNode-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.ppc64le",
"7ComputeNode-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.s390x",
"7ComputeNode-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.x86_64",
"7ComputeNode-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.aarch64",
"7ComputeNode-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.ppc64",
"7ComputeNode-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.ppc64le",
"7ComputeNode-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.s390x",
"7ComputeNode-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.x86_64",
"7Server-7.3.Z:httpd-0:2.4.6-45.el7_3.4.aarch64",
"7Server-7.3.Z:httpd-0:2.4.6-45.el7_3.4.ppc64",
"7Server-7.3.Z:httpd-0:2.4.6-45.el7_3.4.ppc64le",
"7Server-7.3.Z:httpd-0:2.4.6-45.el7_3.4.s390x",
"7Server-7.3.Z:httpd-0:2.4.6-45.el7_3.4.src",
"7Server-7.3.Z:httpd-0:2.4.6-45.el7_3.4.x86_64",
"7Server-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.aarch64",
"7Server-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.ppc64",
"7Server-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.ppc64le",
"7Server-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.s390x",
"7Server-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.x86_64",
"7Server-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.aarch64",
"7Server-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.ppc64",
"7Server-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.ppc64le",
"7Server-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.s390x",
"7Server-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.x86_64",
"7Server-7.3.Z:httpd-manual-0:2.4.6-45.el7_3.4.noarch",
"7Server-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.aarch64",
"7Server-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.ppc64",
"7Server-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.ppc64le",
"7Server-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.s390x",
"7Server-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.x86_64",
"7Server-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.aarch64",
"7Server-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.ppc64",
"7Server-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.ppc64le",
"7Server-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.s390x",
"7Server-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.x86_64",
"7Server-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.aarch64",
"7Server-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.ppc64",
"7Server-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.ppc64le",
"7Server-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.s390x",
"7Server-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.x86_64",
"7Server-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.aarch64",
"7Server-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.ppc64",
"7Server-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.ppc64le",
"7Server-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.s390x",
"7Server-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.x86_64",
"7Server-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.aarch64",
"7Server-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.ppc64",
"7Server-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.ppc64le",
"7Server-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.s390x",
"7Server-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.x86_64",
"7Server-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.aarch64",
"7Server-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.ppc64",
"7Server-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.ppc64le",
"7Server-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.s390x",
"7Server-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.src",
"7Server-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.x86_64",
"7Server-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.aarch64",
"7Server-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.ppc64",
"7Server-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.ppc64le",
"7Server-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.s390x",
"7Server-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.x86_64",
"7Server-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.aarch64",
"7Server-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.ppc64",
"7Server-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.ppc64le",
"7Server-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.s390x",
"7Server-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.x86_64",
"7Server-optional-7.3.Z:httpd-manual-0:2.4.6-45.el7_3.4.noarch",
"7Server-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.aarch64",
"7Server-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.ppc64",
"7Server-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.ppc64le",
"7Server-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.s390x",
"7Server-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.x86_64",
"7Server-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.aarch64",
"7Server-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.ppc64",
"7Server-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.ppc64le",
"7Server-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.s390x",
"7Server-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.x86_64",
"7Server-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.aarch64",
"7Server-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.ppc64",
"7Server-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.ppc64le",
"7Server-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.s390x",
"7Server-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.x86_64",
"7Server-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.aarch64",
"7Server-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.ppc64",
"7Server-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.ppc64le",
"7Server-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.s390x",
"7Server-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.x86_64",
"7Server-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.aarch64",
"7Server-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.ppc64",
"7Server-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.ppc64le",
"7Server-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.s390x",
"7Server-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.x86_64",
"7Workstation-7.3.Z:httpd-0:2.4.6-45.el7_3.4.aarch64",
"7Workstation-7.3.Z:httpd-0:2.4.6-45.el7_3.4.ppc64",
"7Workstation-7.3.Z:httpd-0:2.4.6-45.el7_3.4.ppc64le",
"7Workstation-7.3.Z:httpd-0:2.4.6-45.el7_3.4.s390x",
"7Workstation-7.3.Z:httpd-0:2.4.6-45.el7_3.4.src",
"7Workstation-7.3.Z:httpd-0:2.4.6-45.el7_3.4.x86_64",
"7Workstation-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.aarch64",
"7Workstation-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.ppc64",
"7Workstation-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.ppc64le",
"7Workstation-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.s390x",
"7Workstation-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.x86_64",
"7Workstation-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.aarch64",
"7Workstation-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.ppc64",
"7Workstation-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.ppc64le",
"7Workstation-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.s390x",
"7Workstation-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.x86_64",
"7Workstation-7.3.Z:httpd-manual-0:2.4.6-45.el7_3.4.noarch",
"7Workstation-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.aarch64",
"7Workstation-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.ppc64",
"7Workstation-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.ppc64le",
"7Workstation-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.s390x",
"7Workstation-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.x86_64",
"7Workstation-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.aarch64",
"7Workstation-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.ppc64",
"7Workstation-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.ppc64le",
"7Workstation-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.s390x",
"7Workstation-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.x86_64",
"7Workstation-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.aarch64",
"7Workstation-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.ppc64",
"7Workstation-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.ppc64le",
"7Workstation-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.s390x",
"7Workstation-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.x86_64",
"7Workstation-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.aarch64",
"7Workstation-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.ppc64",
"7Workstation-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.ppc64le",
"7Workstation-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.s390x",
"7Workstation-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.x86_64",
"7Workstation-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.aarch64",
"7Workstation-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.ppc64",
"7Workstation-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.ppc64le",
"7Workstation-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.s390x",
"7Workstation-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.x86_64",
"7Workstation-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.aarch64",
"7Workstation-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.ppc64",
"7Workstation-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.ppc64le",
"7Workstation-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.s390x",
"7Workstation-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.src",
"7Workstation-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.x86_64",
"7Workstation-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.aarch64",
"7Workstation-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.ppc64",
"7Workstation-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.ppc64le",
"7Workstation-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.s390x",
"7Workstation-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.x86_64",
"7Workstation-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.aarch64",
"7Workstation-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.ppc64",
"7Workstation-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.ppc64le",
"7Workstation-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.s390x",
"7Workstation-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.x86_64",
"7Workstation-optional-7.3.Z:httpd-manual-0:2.4.6-45.el7_3.4.noarch",
"7Workstation-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.aarch64",
"7Workstation-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.ppc64",
"7Workstation-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.ppc64le",
"7Workstation-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.s390x",
"7Workstation-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.x86_64",
"7Workstation-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.aarch64",
"7Workstation-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.ppc64",
"7Workstation-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.ppc64le",
"7Workstation-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.s390x",
"7Workstation-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.x86_64",
"7Workstation-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.aarch64",
"7Workstation-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.ppc64",
"7Workstation-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.ppc64le",
"7Workstation-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.s390x",
"7Workstation-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.x86_64",
"7Workstation-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.aarch64",
"7Workstation-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.ppc64",
"7Workstation-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.ppc64le",
"7Workstation-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.s390x",
"7Workstation-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.x86_64",
"7Workstation-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.aarch64",
"7Workstation-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.ppc64",
"7Workstation-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.ppc64le",
"7Workstation-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.s390x",
"7Workstation-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2017:0906"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"version": "2.0"
},
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 4.0,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:L/A:N",
"version": "3.0"
},
"products": [
"7Client-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.aarch64",
"7Client-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.ppc64",
"7Client-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.ppc64le",
"7Client-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.s390x",
"7Client-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.src",
"7Client-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.x86_64",
"7Client-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.aarch64",
"7Client-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.ppc64",
"7Client-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.ppc64le",
"7Client-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.s390x",
"7Client-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.x86_64",
"7Client-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.aarch64",
"7Client-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.ppc64",
"7Client-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.ppc64le",
"7Client-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.s390x",
"7Client-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.x86_64",
"7Client-optional-7.3.Z:httpd-manual-0:2.4.6-45.el7_3.4.noarch",
"7Client-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.aarch64",
"7Client-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.ppc64",
"7Client-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.ppc64le",
"7Client-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.s390x",
"7Client-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.x86_64",
"7Client-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.aarch64",
"7Client-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.ppc64",
"7Client-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.ppc64le",
"7Client-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.s390x",
"7Client-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.x86_64",
"7Client-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.aarch64",
"7Client-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.ppc64",
"7Client-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.ppc64le",
"7Client-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.s390x",
"7Client-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.x86_64",
"7Client-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.aarch64",
"7Client-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.ppc64",
"7Client-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.ppc64le",
"7Client-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.s390x",
"7Client-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.x86_64",
"7Client-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.aarch64",
"7Client-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.ppc64",
"7Client-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.ppc64le",
"7Client-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.s390x",
"7Client-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.x86_64",
"7ComputeNode-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.aarch64",
"7ComputeNode-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.ppc64",
"7ComputeNode-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.ppc64le",
"7ComputeNode-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.s390x",
"7ComputeNode-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.src",
"7ComputeNode-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.x86_64",
"7ComputeNode-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.aarch64",
"7ComputeNode-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.ppc64",
"7ComputeNode-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.ppc64le",
"7ComputeNode-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.s390x",
"7ComputeNode-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.x86_64",
"7ComputeNode-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.aarch64",
"7ComputeNode-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.ppc64",
"7ComputeNode-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.ppc64le",
"7ComputeNode-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.s390x",
"7ComputeNode-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.x86_64",
"7ComputeNode-optional-7.3.Z:httpd-manual-0:2.4.6-45.el7_3.4.noarch",
"7ComputeNode-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.aarch64",
"7ComputeNode-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.ppc64",
"7ComputeNode-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.ppc64le",
"7ComputeNode-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.s390x",
"7ComputeNode-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.x86_64",
"7ComputeNode-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.aarch64",
"7ComputeNode-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.ppc64",
"7ComputeNode-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.ppc64le",
"7ComputeNode-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.s390x",
"7ComputeNode-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.x86_64",
"7ComputeNode-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.aarch64",
"7ComputeNode-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.ppc64",
"7ComputeNode-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.ppc64le",
"7ComputeNode-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.s390x",
"7ComputeNode-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.x86_64",
"7ComputeNode-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.aarch64",
"7ComputeNode-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.ppc64",
"7ComputeNode-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.ppc64le",
"7ComputeNode-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.s390x",
"7ComputeNode-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.x86_64",
"7ComputeNode-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.aarch64",
"7ComputeNode-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.ppc64",
"7ComputeNode-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.ppc64le",
"7ComputeNode-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.s390x",
"7ComputeNode-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.x86_64",
"7Server-7.3.Z:httpd-0:2.4.6-45.el7_3.4.aarch64",
"7Server-7.3.Z:httpd-0:2.4.6-45.el7_3.4.ppc64",
"7Server-7.3.Z:httpd-0:2.4.6-45.el7_3.4.ppc64le",
"7Server-7.3.Z:httpd-0:2.4.6-45.el7_3.4.s390x",
"7Server-7.3.Z:httpd-0:2.4.6-45.el7_3.4.src",
"7Server-7.3.Z:httpd-0:2.4.6-45.el7_3.4.x86_64",
"7Server-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.aarch64",
"7Server-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.ppc64",
"7Server-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.ppc64le",
"7Server-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.s390x",
"7Server-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.x86_64",
"7Server-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.aarch64",
"7Server-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.ppc64",
"7Server-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.ppc64le",
"7Server-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.s390x",
"7Server-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.x86_64",
"7Server-7.3.Z:httpd-manual-0:2.4.6-45.el7_3.4.noarch",
"7Server-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.aarch64",
"7Server-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.ppc64",
"7Server-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.ppc64le",
"7Server-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.s390x",
"7Server-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.x86_64",
"7Server-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.aarch64",
"7Server-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.ppc64",
"7Server-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.ppc64le",
"7Server-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.s390x",
"7Server-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.x86_64",
"7Server-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.aarch64",
"7Server-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.ppc64",
"7Server-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.ppc64le",
"7Server-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.s390x",
"7Server-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.x86_64",
"7Server-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.aarch64",
"7Server-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.ppc64",
"7Server-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.ppc64le",
"7Server-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.s390x",
"7Server-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.x86_64",
"7Server-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.aarch64",
"7Server-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.ppc64",
"7Server-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.ppc64le",
"7Server-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.s390x",
"7Server-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.x86_64",
"7Server-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.aarch64",
"7Server-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.ppc64",
"7Server-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.ppc64le",
"7Server-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.s390x",
"7Server-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.src",
"7Server-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.x86_64",
"7Server-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.aarch64",
"7Server-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.ppc64",
"7Server-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.ppc64le",
"7Server-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.s390x",
"7Server-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.x86_64",
"7Server-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.aarch64",
"7Server-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.ppc64",
"7Server-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.ppc64le",
"7Server-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.s390x",
"7Server-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.x86_64",
"7Server-optional-7.3.Z:httpd-manual-0:2.4.6-45.el7_3.4.noarch",
"7Server-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.aarch64",
"7Server-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.ppc64",
"7Server-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.ppc64le",
"7Server-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.s390x",
"7Server-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.x86_64",
"7Server-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.aarch64",
"7Server-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.ppc64",
"7Server-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.ppc64le",
"7Server-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.s390x",
"7Server-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.x86_64",
"7Server-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.aarch64",
"7Server-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.ppc64",
"7Server-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.ppc64le",
"7Server-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.s390x",
"7Server-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.x86_64",
"7Server-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.aarch64",
"7Server-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.ppc64",
"7Server-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.ppc64le",
"7Server-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.s390x",
"7Server-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.x86_64",
"7Server-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.aarch64",
"7Server-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.ppc64",
"7Server-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.ppc64le",
"7Server-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.s390x",
"7Server-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.x86_64",
"7Workstation-7.3.Z:httpd-0:2.4.6-45.el7_3.4.aarch64",
"7Workstation-7.3.Z:httpd-0:2.4.6-45.el7_3.4.ppc64",
"7Workstation-7.3.Z:httpd-0:2.4.6-45.el7_3.4.ppc64le",
"7Workstation-7.3.Z:httpd-0:2.4.6-45.el7_3.4.s390x",
"7Workstation-7.3.Z:httpd-0:2.4.6-45.el7_3.4.src",
"7Workstation-7.3.Z:httpd-0:2.4.6-45.el7_3.4.x86_64",
"7Workstation-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.aarch64",
"7Workstation-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.ppc64",
"7Workstation-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.ppc64le",
"7Workstation-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.s390x",
"7Workstation-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.x86_64",
"7Workstation-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.aarch64",
"7Workstation-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.ppc64",
"7Workstation-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.ppc64le",
"7Workstation-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.s390x",
"7Workstation-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.x86_64",
"7Workstation-7.3.Z:httpd-manual-0:2.4.6-45.el7_3.4.noarch",
"7Workstation-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.aarch64",
"7Workstation-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.ppc64",
"7Workstation-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.ppc64le",
"7Workstation-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.s390x",
"7Workstation-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.x86_64",
"7Workstation-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.aarch64",
"7Workstation-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.ppc64",
"7Workstation-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.ppc64le",
"7Workstation-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.s390x",
"7Workstation-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.x86_64",
"7Workstation-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.aarch64",
"7Workstation-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.ppc64",
"7Workstation-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.ppc64le",
"7Workstation-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.s390x",
"7Workstation-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.x86_64",
"7Workstation-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.aarch64",
"7Workstation-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.ppc64",
"7Workstation-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.ppc64le",
"7Workstation-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.s390x",
"7Workstation-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.x86_64",
"7Workstation-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.aarch64",
"7Workstation-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.ppc64",
"7Workstation-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.ppc64le",
"7Workstation-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.s390x",
"7Workstation-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.x86_64",
"7Workstation-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.aarch64",
"7Workstation-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.ppc64",
"7Workstation-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.ppc64le",
"7Workstation-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.s390x",
"7Workstation-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.src",
"7Workstation-optional-7.3.Z:httpd-0:2.4.6-45.el7_3.4.x86_64",
"7Workstation-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.aarch64",
"7Workstation-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.ppc64",
"7Workstation-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.ppc64le",
"7Workstation-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.s390x",
"7Workstation-optional-7.3.Z:httpd-debuginfo-0:2.4.6-45.el7_3.4.x86_64",
"7Workstation-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.aarch64",
"7Workstation-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.ppc64",
"7Workstation-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.ppc64le",
"7Workstation-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.s390x",
"7Workstation-optional-7.3.Z:httpd-devel-0:2.4.6-45.el7_3.4.x86_64",
"7Workstation-optional-7.3.Z:httpd-manual-0:2.4.6-45.el7_3.4.noarch",
"7Workstation-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.aarch64",
"7Workstation-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.ppc64",
"7Workstation-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.ppc64le",
"7Workstation-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.s390x",
"7Workstation-optional-7.3.Z:httpd-tools-0:2.4.6-45.el7_3.4.x86_64",
"7Workstation-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.aarch64",
"7Workstation-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.ppc64",
"7Workstation-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.ppc64le",
"7Workstation-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.s390x",
"7Workstation-optional-7.3.Z:mod_ldap-0:2.4.6-45.el7_3.4.x86_64",
"7Workstation-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.aarch64",
"7Workstation-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.ppc64",
"7Workstation-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.ppc64le",
"7Workstation-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.s390x",
"7Workstation-optional-7.3.Z:mod_proxy_html-1:2.4.6-45.el7_3.4.x86_64",
"7Workstation-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.aarch64",
"7Workstation-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.ppc64",
"7Workstation-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.ppc64le",
"7Workstation-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.s390x",
"7Workstation-optional-7.3.Z:mod_session-0:2.4.6-45.el7_3.4.x86_64",
"7Workstation-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.aarch64",
"7Workstation-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.ppc64",
"7Workstation-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.ppc64le",
"7Workstation-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.s390x",
"7Workstation-optional-7.3.Z:mod_ssl-1:2.4.6-45.el7_3.4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "httpd: Apache HTTP Request Parsing Whitespace Defects"
}
]
}
RHSA-2017:1161
Vulnerability from csaf_redhat - Published: 2017-04-26 10:19 - Updated: 2026-05-14 22:23It was discovered that the mod_session_crypto module of httpd did not use any mechanisms to verify integrity of the encrypted session data stored in the user's browser. A remote attacker could use this flaw to decrypt and modify session data using a padding oracle attack.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-0:2.4.25-9.el6.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-0:2.4.25-9.el6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-debuginfo-0:2.4.25-9.el6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-devel-0:2.4.25-9.el6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-manual-0:2.4.25-9.el6.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-tools-0:2.4.25-9.el6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-RHSCL-2.4-6.7.Z:httpd24-mod_ldap-0:2.4.25-9.el6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-RHSCL-2.4-6.7.Z:httpd24-mod_proxy_html-1:2.4.25-9.el6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-RHSCL-2.4-6.7.Z:httpd24-mod_session-0:2.4.25-9.el6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-RHSCL-2.4-6.7.Z:httpd24-mod_ssl-1:2.4.25-9.el6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el6.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el6.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-0:2.4.25-9.el7.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-0:2.4.25-9.el7.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-debuginfo-0:2.4.25-9.el7.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-devel-0:2.4.25-9.el7.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-manual-0:2.4.25-9.el7.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-tools-0:2.4.25-9.el7.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-RHSCL-2.4-7.3.Z:httpd24-mod_ldap-0:2.4.25-9.el7.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-RHSCL-2.4-7.3.Z:httpd24-mod_proxy_html-1:2.4.25-9.el7.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-RHSCL-2.4-7.3.Z:httpd24-mod_session-0:2.4.25-9.el7.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-RHSCL-2.4-7.3.Z:httpd24-mod_ssl-1:2.4.25-9.el7.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el7.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el7.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el7.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el7.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el7.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el7.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el7.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el7.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Workstation-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el7.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Workstation-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el7.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Workstation-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el7.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Workstation-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el7.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Workstation-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el7.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Workstation-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el7.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Workstation-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el7.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Workstation-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el7.x86_64 | — |
Vendor Fix
fix
|
A denial of service flaw was found in httpd's mod_http2 module. A remote attacker could use this flaw to block server threads for long times, causing starvation of worker threads, by manipulating the flow control windows on streams.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-0:2.4.25-9.el6.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-0:2.4.25-9.el6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-debuginfo-0:2.4.25-9.el6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-devel-0:2.4.25-9.el6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-manual-0:2.4.25-9.el6.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-tools-0:2.4.25-9.el6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-RHSCL-2.4-6.7.Z:httpd24-mod_ldap-0:2.4.25-9.el6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-RHSCL-2.4-6.7.Z:httpd24-mod_proxy_html-1:2.4.25-9.el6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-RHSCL-2.4-6.7.Z:httpd24-mod_session-0:2.4.25-9.el6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-RHSCL-2.4-6.7.Z:httpd24-mod_ssl-1:2.4.25-9.el6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el6.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el6.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-0:2.4.25-9.el7.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-0:2.4.25-9.el7.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-debuginfo-0:2.4.25-9.el7.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-devel-0:2.4.25-9.el7.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-manual-0:2.4.25-9.el7.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-tools-0:2.4.25-9.el7.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-RHSCL-2.4-7.3.Z:httpd24-mod_ldap-0:2.4.25-9.el7.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-RHSCL-2.4-7.3.Z:httpd24-mod_proxy_html-1:2.4.25-9.el7.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-RHSCL-2.4-7.3.Z:httpd24-mod_session-0:2.4.25-9.el7.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-RHSCL-2.4-7.3.Z:httpd24-mod_ssl-1:2.4.25-9.el7.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el7.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el7.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el7.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el7.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el7.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el7.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el7.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el7.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Workstation-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el7.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Workstation-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el7.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Workstation-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el7.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Workstation-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el7.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Workstation-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el7.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Workstation-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el7.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Workstation-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el7.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Workstation-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el7.x86_64 | — |
Vendor Fix
fix
|
It was discovered that the mod_auth_digest module of httpd did not properly check for memory allocation failures. A remote attacker could use this flaw to cause httpd child processes to repeatedly crash if the server used HTTP digest authentication.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-0:2.4.25-9.el6.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-0:2.4.25-9.el6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-debuginfo-0:2.4.25-9.el6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-devel-0:2.4.25-9.el6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-manual-0:2.4.25-9.el6.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-tools-0:2.4.25-9.el6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-RHSCL-2.4-6.7.Z:httpd24-mod_ldap-0:2.4.25-9.el6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-RHSCL-2.4-6.7.Z:httpd24-mod_proxy_html-1:2.4.25-9.el6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-RHSCL-2.4-6.7.Z:httpd24-mod_session-0:2.4.25-9.el6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-RHSCL-2.4-6.7.Z:httpd24-mod_ssl-1:2.4.25-9.el6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el6.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el6.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-0:2.4.25-9.el7.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-0:2.4.25-9.el7.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-debuginfo-0:2.4.25-9.el7.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-devel-0:2.4.25-9.el7.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-manual-0:2.4.25-9.el7.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-tools-0:2.4.25-9.el7.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-RHSCL-2.4-7.3.Z:httpd24-mod_ldap-0:2.4.25-9.el7.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-RHSCL-2.4-7.3.Z:httpd24-mod_proxy_html-1:2.4.25-9.el7.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-RHSCL-2.4-7.3.Z:httpd24-mod_session-0:2.4.25-9.el7.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-RHSCL-2.4-7.3.Z:httpd24-mod_ssl-1:2.4.25-9.el7.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el7.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el7.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el7.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el7.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el7.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el7.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el7.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el7.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Workstation-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el7.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Workstation-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el7.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Workstation-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el7.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Workstation-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el7.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Workstation-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el7.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Workstation-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el7.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Workstation-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el7.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Workstation-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el7.x86_64 | — |
Vendor Fix
fix
|
A vulnerability was found in httpd's handling of the LimitRequestFields directive in mod_http2, affecting servers with HTTP/2 enabled. An attacker could send crafted requests with headers larger than the server's available memory, causing httpd to crash.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-0:2.4.25-9.el6.src | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-0:2.4.25-9.el6.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-debuginfo-0:2.4.25-9.el6.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-devel-0:2.4.25-9.el6.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-manual-0:2.4.25-9.el6.noarch | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-tools-0:2.4.25-9.el6.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 6Server-RHSCL-2.4-6.7.Z:httpd24-mod_ldap-0:2.4.25-9.el6.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 6Server-RHSCL-2.4-6.7.Z:httpd24-mod_proxy_html-1:2.4.25-9.el6.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 6Server-RHSCL-2.4-6.7.Z:httpd24-mod_session-0:2.4.25-9.el6.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 6Server-RHSCL-2.4-6.7.Z:httpd24-mod_ssl-1:2.4.25-9.el6.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 6Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.src | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 6Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 6Server-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el6.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 6Server-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el6.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 6Server-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el6.noarch | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 6Server-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el6.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 6Server-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el6.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 6Server-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el6.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 6Server-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el6.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 6Server-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el6.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 6Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.src | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 6Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 6Workstation-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el6.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 6Workstation-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el6.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 6Workstation-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el6.noarch | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 6Workstation-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el6.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 6Workstation-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el6.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 6Workstation-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el6.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 6Workstation-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el6.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 6Workstation-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el6.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-0:2.4.25-9.el7.src | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-0:2.4.25-9.el7.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-debuginfo-0:2.4.25-9.el7.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-devel-0:2.4.25-9.el7.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-manual-0:2.4.25-9.el7.noarch | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-tools-0:2.4.25-9.el7.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 7Server-RHSCL-2.4-7.3.Z:httpd24-mod_ldap-0:2.4.25-9.el7.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 7Server-RHSCL-2.4-7.3.Z:httpd24-mod_proxy_html-1:2.4.25-9.el7.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 7Server-RHSCL-2.4-7.3.Z:httpd24-mod_session-0:2.4.25-9.el7.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 7Server-RHSCL-2.4-7.3.Z:httpd24-mod_ssl-1:2.4.25-9.el7.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 7Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.src | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 7Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 7Server-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el7.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 7Server-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el7.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 7Server-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el7.noarch | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 7Server-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el7.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 7Server-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el7.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 7Server-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el7.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 7Server-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el7.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 7Server-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el7.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 7Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.src | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 7Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 7Workstation-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el7.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 7Workstation-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el7.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 7Workstation-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el7.noarch | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 7Workstation-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el7.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 7Workstation-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el7.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 7Workstation-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el7.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 7Workstation-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el7.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 7Workstation-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el7.x86_64 | — |
Vendor Fix
fix
Workaround
|
It was discovered that the HTTP parser in httpd incorrectly allowed certain characters not permitted by the HTTP protocol specification to appear unencoded in HTTP request headers. If httpd was used in conjunction with a proxy or backend server that interpreted those characters differently, a remote attacker could possibly use this flaw to inject data into HTTP responses, resulting in proxy cache poisoning.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-0:2.4.25-9.el6.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-0:2.4.25-9.el6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-debuginfo-0:2.4.25-9.el6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-devel-0:2.4.25-9.el6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-manual-0:2.4.25-9.el6.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-tools-0:2.4.25-9.el6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-RHSCL-2.4-6.7.Z:httpd24-mod_ldap-0:2.4.25-9.el6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-RHSCL-2.4-6.7.Z:httpd24-mod_proxy_html-1:2.4.25-9.el6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-RHSCL-2.4-6.7.Z:httpd24-mod_session-0:2.4.25-9.el6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-RHSCL-2.4-6.7.Z:httpd24-mod_ssl-1:2.4.25-9.el6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el6.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el6.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-0:2.4.25-9.el7.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-0:2.4.25-9.el7.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-debuginfo-0:2.4.25-9.el7.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-devel-0:2.4.25-9.el7.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-manual-0:2.4.25-9.el7.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-tools-0:2.4.25-9.el7.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-RHSCL-2.4-7.3.Z:httpd24-mod_ldap-0:2.4.25-9.el7.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-RHSCL-2.4-7.3.Z:httpd24-mod_proxy_html-1:2.4.25-9.el7.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-RHSCL-2.4-7.3.Z:httpd24-mod_session-0:2.4.25-9.el7.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-RHSCL-2.4-7.3.Z:httpd24-mod_ssl-1:2.4.25-9.el7.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el7.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el7.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el7.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el7.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el7.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el7.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el7.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el7.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Workstation-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el7.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Workstation-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el7.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Workstation-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el7.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Workstation-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el7.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Workstation-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el7.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Workstation-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el7.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Workstation-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el7.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Workstation-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el7.x86_64 | — |
Vendor Fix
fix
|
A flaw was found in the mod_remoteip module shipped with the httpd package. This flaw allows an attacker to spoof the IP address, resulting in the bypass of a mod_rewrite rule. The highest threat from this vulnerability is to integrity.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-0:2.4.25-9.el6.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-0:2.4.25-9.el6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-debuginfo-0:2.4.25-9.el6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-devel-0:2.4.25-9.el6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-manual-0:2.4.25-9.el6.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-tools-0:2.4.25-9.el6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-RHSCL-2.4-6.7.Z:httpd24-mod_ldap-0:2.4.25-9.el6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-RHSCL-2.4-6.7.Z:httpd24-mod_proxy_html-1:2.4.25-9.el6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-RHSCL-2.4-6.7.Z:httpd24-mod_session-0:2.4.25-9.el6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-RHSCL-2.4-6.7.Z:httpd24-mod_ssl-1:2.4.25-9.el6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el6.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el6.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el6.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-0:2.4.25-9.el7.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-0:2.4.25-9.el7.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-debuginfo-0:2.4.25-9.el7.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-devel-0:2.4.25-9.el7.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-manual-0:2.4.25-9.el7.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-tools-0:2.4.25-9.el7.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-RHSCL-2.4-7.3.Z:httpd24-mod_ldap-0:2.4.25-9.el7.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-RHSCL-2.4-7.3.Z:httpd24-mod_proxy_html-1:2.4.25-9.el7.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-RHSCL-2.4-7.3.Z:httpd24-mod_session-0:2.4.25-9.el7.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-RHSCL-2.4-7.3.Z:httpd24-mod_ssl-1:2.4.25-9.el7.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el7.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el7.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el7.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el7.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el7.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el7.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el7.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el7.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Workstation-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el7.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Workstation-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el7.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Workstation-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el7.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Workstation-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el7.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Workstation-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el7.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Workstation-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el7.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Workstation-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el7.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Workstation-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el7.x86_64 | — |
Vendor Fix
fix
|
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Updated httpd24 packages are now available as a part of Red Hat Software Collections 2.4 for Red Hat Enterprise Linux.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The Apache HTTP Server is a powerful, efficient, and extensible web server. The httpd24 packages provide a recent stable release of version 2.4 of the Apache HTTP Server, along with the mod_auth_kerb module.\n\nThe httpd24 Software Collection has been upgraded to version 2.4.25, which provides a number of bug fixes and enhancements over the previous version. For detailed changes, see the Red Hat Software Collections 2.4 Release Notes linked from the References section. (BZ#1404778)\n\nSecurity Fix(es):\n\n* It was discovered that the mod_session_crypto module of httpd did not use any mechanisms to verify integrity of the encrypted session data stored in the user\u0027s browser. A remote attacker could use this flaw to decrypt and modify session data using a padding oracle attack. (CVE-2016-0736)\n\n* A denial of service flaw was found in httpd\u0027s mod_http2 module. A remote attacker could use this flaw to block server threads for long times, causing starvation of worker threads, by manipulating the flow control windows on streams. (CVE-2016-1546)\n\n* It was discovered that the mod_auth_digest module of httpd did not properly check for memory allocation failures. A remote attacker could use this flaw to cause httpd child processes to repeatedly crash if the server used HTTP digest authentication. (CVE-2016-2161)\n\n* It was discovered that the HTTP parser in httpd incorrectly allowed certain characters not permitted by the HTTP protocol specification to appear unencoded in HTTP request headers. If httpd was used in conjunction with a proxy or backend server that interpreted those characters differently, a remote attacker could possibly use this flaw to inject data into HTTP responses, resulting in proxy cache poisoning. (CVE-2016-8743)\n\nNote: The fix for the CVE-2016-8743 issue causes httpd to return \"400 Bad Request\" error to HTTP clients which do not strictly follow HTTP protocol specification. A newly introduced configuration directive \"HttpProtocolOptions Unsafe\" can be used to re-enable the old less strict parsing. However, such setting also re-introduces the CVE-2016-8743 issue.\n\n* A vulnerability was found in httpd\u0027s handling of the LimitRequestFields directive in mod_http2, affecting servers with HTTP/2 enabled. An attacker could send crafted requests with headers larger than the server\u0027s available memory, causing httpd to crash. (CVE-2016-8740)",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2017:1161",
"url": "https://access.redhat.com/errata/RHSA-2017:1161"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#moderate",
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "https://access.redhat.com/documentation/en-US/Red_Hat_Software_Collections/2/html/2.4_Release_Notes/chap-RHSCL.html#sect-RHSCL-Changes-httpd",
"url": "https://access.redhat.com/documentation/en-US/Red_Hat_Software_Collections/2/html/2.4_Release_Notes/chap-RHSCL.html#sect-RHSCL-Changes-httpd"
},
{
"category": "external",
"summary": "1329639",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1329639"
},
{
"category": "external",
"summary": "1335616",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1335616"
},
{
"category": "external",
"summary": "1336350",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1336350"
},
{
"category": "external",
"summary": "1401528",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1401528"
},
{
"category": "external",
"summary": "1406744",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1406744"
},
{
"category": "external",
"summary": "1406753",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1406753"
},
{
"category": "external",
"summary": "1406822",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1406822"
},
{
"category": "external",
"summary": "1414037",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1414037"
},
{
"category": "external",
"summary": "1432249",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1432249"
},
{
"category": "external",
"summary": "1433474",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1433474"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2017/rhsa-2017_1161.json"
}
],
"title": "Red Hat Security Advisory: httpd24-httpd security, bug fix, and enhancement update",
"tracking": {
"current_release_date": "2026-05-14T22:23:28+00:00",
"generator": {
"date": "2026-05-14T22:23:28+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.8.0"
}
},
"id": "RHSA-2017:1161",
"initial_release_date": "2017-04-26T10:19:21+00:00",
"revision_history": [
{
"date": "2017-04-26T10:19:21+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2017-04-26T10:19:21+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-05-14T22:23:28+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 6)",
"product": {
"name": "Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-RHSCL-2.4",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_software_collections:2::el6"
}
}
},
{
"category": "product_name",
"name": "Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 6)",
"product": {
"name": "Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-RHSCL-2.4",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_software_collections:2::el6"
}
}
},
{
"category": "product_name",
"name": "Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product": {
"name": "Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-RHSCL-2.4-6.7.Z",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_software_collections:2::el6"
}
}
},
{
"category": "product_name",
"name": "Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)",
"product": {
"name": "Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-RHSCL-2.4",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_software_collections:2::el7"
}
}
},
{
"category": "product_name",
"name": "Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)",
"product": {
"name": "Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-RHSCL-2.4",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_software_collections:2::el7"
}
}
},
{
"category": "product_name",
"name": "Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product": {
"name": "Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-RHSCL-2.4-7.3.Z",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_software_collections:2::el7"
}
}
}
],
"category": "product_family",
"name": "Red Hat Software Collections"
},
{
"branches": [
{
"category": "product_version",
"name": "httpd24-httpd-manual-0:2.4.25-9.el6.noarch",
"product": {
"name": "httpd24-httpd-manual-0:2.4.25-9.el6.noarch",
"product_id": "httpd24-httpd-manual-0:2.4.25-9.el6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd24-httpd-manual@2.4.25-9.el6?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "httpd24-httpd-manual-0:2.4.25-9.el7.noarch",
"product": {
"name": "httpd24-httpd-manual-0:2.4.25-9.el7.noarch",
"product_id": "httpd24-httpd-manual-0:2.4.25-9.el7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd24-httpd-manual@2.4.25-9.el7?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "httpd24-mod_ssl-1:2.4.25-9.el6.x86_64",
"product": {
"name": "httpd24-mod_ssl-1:2.4.25-9.el6.x86_64",
"product_id": "httpd24-mod_ssl-1:2.4.25-9.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd24-mod_ssl@2.4.25-9.el6?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "httpd24-httpd-debuginfo-0:2.4.25-9.el6.x86_64",
"product": {
"name": "httpd24-httpd-debuginfo-0:2.4.25-9.el6.x86_64",
"product_id": "httpd24-httpd-debuginfo-0:2.4.25-9.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd24-httpd-debuginfo@2.4.25-9.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "httpd24-mod_session-0:2.4.25-9.el6.x86_64",
"product": {
"name": "httpd24-mod_session-0:2.4.25-9.el6.x86_64",
"product_id": "httpd24-mod_session-0:2.4.25-9.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd24-mod_session@2.4.25-9.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "httpd24-mod_proxy_html-1:2.4.25-9.el6.x86_64",
"product": {
"name": "httpd24-mod_proxy_html-1:2.4.25-9.el6.x86_64",
"product_id": "httpd24-mod_proxy_html-1:2.4.25-9.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd24-mod_proxy_html@2.4.25-9.el6?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "httpd24-mod_ldap-0:2.4.25-9.el6.x86_64",
"product": {
"name": "httpd24-mod_ldap-0:2.4.25-9.el6.x86_64",
"product_id": "httpd24-mod_ldap-0:2.4.25-9.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd24-mod_ldap@2.4.25-9.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "httpd24-httpd-0:2.4.25-9.el6.x86_64",
"product": {
"name": "httpd24-httpd-0:2.4.25-9.el6.x86_64",
"product_id": "httpd24-httpd-0:2.4.25-9.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd24-httpd@2.4.25-9.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "httpd24-httpd-devel-0:2.4.25-9.el6.x86_64",
"product": {
"name": "httpd24-httpd-devel-0:2.4.25-9.el6.x86_64",
"product_id": "httpd24-httpd-devel-0:2.4.25-9.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd24-httpd-devel@2.4.25-9.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "httpd24-httpd-tools-0:2.4.25-9.el6.x86_64",
"product": {
"name": "httpd24-httpd-tools-0:2.4.25-9.el6.x86_64",
"product_id": "httpd24-httpd-tools-0:2.4.25-9.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd24-httpd-tools@2.4.25-9.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "httpd24-mod_ssl-1:2.4.25-9.el7.x86_64",
"product": {
"name": "httpd24-mod_ssl-1:2.4.25-9.el7.x86_64",
"product_id": "httpd24-mod_ssl-1:2.4.25-9.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd24-mod_ssl@2.4.25-9.el7?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "httpd24-mod_session-0:2.4.25-9.el7.x86_64",
"product": {
"name": "httpd24-mod_session-0:2.4.25-9.el7.x86_64",
"product_id": "httpd24-mod_session-0:2.4.25-9.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd24-mod_session@2.4.25-9.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "httpd24-httpd-debuginfo-0:2.4.25-9.el7.x86_64",
"product": {
"name": "httpd24-httpd-debuginfo-0:2.4.25-9.el7.x86_64",
"product_id": "httpd24-httpd-debuginfo-0:2.4.25-9.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd24-httpd-debuginfo@2.4.25-9.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "httpd24-mod_proxy_html-1:2.4.25-9.el7.x86_64",
"product": {
"name": "httpd24-mod_proxy_html-1:2.4.25-9.el7.x86_64",
"product_id": "httpd24-mod_proxy_html-1:2.4.25-9.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd24-mod_proxy_html@2.4.25-9.el7?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "httpd24-mod_ldap-0:2.4.25-9.el7.x86_64",
"product": {
"name": "httpd24-mod_ldap-0:2.4.25-9.el7.x86_64",
"product_id": "httpd24-mod_ldap-0:2.4.25-9.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd24-mod_ldap@2.4.25-9.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "httpd24-httpd-0:2.4.25-9.el7.x86_64",
"product": {
"name": "httpd24-httpd-0:2.4.25-9.el7.x86_64",
"product_id": "httpd24-httpd-0:2.4.25-9.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd24-httpd@2.4.25-9.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "httpd24-httpd-devel-0:2.4.25-9.el7.x86_64",
"product": {
"name": "httpd24-httpd-devel-0:2.4.25-9.el7.x86_64",
"product_id": "httpd24-httpd-devel-0:2.4.25-9.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd24-httpd-devel@2.4.25-9.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "httpd24-httpd-tools-0:2.4.25-9.el7.x86_64",
"product": {
"name": "httpd24-httpd-tools-0:2.4.25-9.el7.x86_64",
"product_id": "httpd24-httpd-tools-0:2.4.25-9.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd24-httpd-tools@2.4.25-9.el7?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "httpd24-httpd-0:2.4.25-9.el6.src",
"product": {
"name": "httpd24-httpd-0:2.4.25-9.el6.src",
"product_id": "httpd24-httpd-0:2.4.25-9.el6.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd24-httpd@2.4.25-9.el6?arch=src"
}
}
},
{
"category": "product_version",
"name": "httpd24-httpd-0:2.4.25-9.el7.src",
"product": {
"name": "httpd24-httpd-0:2.4.25-9.el7.src",
"product_id": "httpd24-httpd-0:2.4.25-9.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd24-httpd@2.4.25-9.el7?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd24-httpd-0:2.4.25-9.el6.src as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-0:2.4.25-9.el6.src"
},
"product_reference": "httpd24-httpd-0:2.4.25-9.el6.src",
"relates_to_product_reference": "6Server-RHSCL-2.4-6.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd24-httpd-0:2.4.25-9.el6.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-0:2.4.25-9.el6.x86_64"
},
"product_reference": "httpd24-httpd-0:2.4.25-9.el6.x86_64",
"relates_to_product_reference": "6Server-RHSCL-2.4-6.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd24-httpd-debuginfo-0:2.4.25-9.el6.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-debuginfo-0:2.4.25-9.el6.x86_64"
},
"product_reference": "httpd24-httpd-debuginfo-0:2.4.25-9.el6.x86_64",
"relates_to_product_reference": "6Server-RHSCL-2.4-6.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd24-httpd-devel-0:2.4.25-9.el6.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-devel-0:2.4.25-9.el6.x86_64"
},
"product_reference": "httpd24-httpd-devel-0:2.4.25-9.el6.x86_64",
"relates_to_product_reference": "6Server-RHSCL-2.4-6.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd24-httpd-manual-0:2.4.25-9.el6.noarch as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-manual-0:2.4.25-9.el6.noarch"
},
"product_reference": "httpd24-httpd-manual-0:2.4.25-9.el6.noarch",
"relates_to_product_reference": "6Server-RHSCL-2.4-6.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd24-httpd-tools-0:2.4.25-9.el6.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-tools-0:2.4.25-9.el6.x86_64"
},
"product_reference": "httpd24-httpd-tools-0:2.4.25-9.el6.x86_64",
"relates_to_product_reference": "6Server-RHSCL-2.4-6.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd24-mod_ldap-0:2.4.25-9.el6.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-RHSCL-2.4-6.7.Z:httpd24-mod_ldap-0:2.4.25-9.el6.x86_64"
},
"product_reference": "httpd24-mod_ldap-0:2.4.25-9.el6.x86_64",
"relates_to_product_reference": "6Server-RHSCL-2.4-6.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd24-mod_proxy_html-1:2.4.25-9.el6.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-RHSCL-2.4-6.7.Z:httpd24-mod_proxy_html-1:2.4.25-9.el6.x86_64"
},
"product_reference": "httpd24-mod_proxy_html-1:2.4.25-9.el6.x86_64",
"relates_to_product_reference": "6Server-RHSCL-2.4-6.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd24-mod_session-0:2.4.25-9.el6.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-RHSCL-2.4-6.7.Z:httpd24-mod_session-0:2.4.25-9.el6.x86_64"
},
"product_reference": "httpd24-mod_session-0:2.4.25-9.el6.x86_64",
"relates_to_product_reference": "6Server-RHSCL-2.4-6.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd24-mod_ssl-1:2.4.25-9.el6.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-RHSCL-2.4-6.7.Z:httpd24-mod_ssl-1:2.4.25-9.el6.x86_64"
},
"product_reference": "httpd24-mod_ssl-1:2.4.25-9.el6.x86_64",
"relates_to_product_reference": "6Server-RHSCL-2.4-6.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd24-httpd-0:2.4.25-9.el6.src as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.src"
},
"product_reference": "httpd24-httpd-0:2.4.25-9.el6.src",
"relates_to_product_reference": "6Server-RHSCL-2.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd24-httpd-0:2.4.25-9.el6.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.x86_64"
},
"product_reference": "httpd24-httpd-0:2.4.25-9.el6.x86_64",
"relates_to_product_reference": "6Server-RHSCL-2.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd24-httpd-debuginfo-0:2.4.25-9.el6.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el6.x86_64"
},
"product_reference": "httpd24-httpd-debuginfo-0:2.4.25-9.el6.x86_64",
"relates_to_product_reference": "6Server-RHSCL-2.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd24-httpd-devel-0:2.4.25-9.el6.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el6.x86_64"
},
"product_reference": "httpd24-httpd-devel-0:2.4.25-9.el6.x86_64",
"relates_to_product_reference": "6Server-RHSCL-2.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd24-httpd-manual-0:2.4.25-9.el6.noarch as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el6.noarch"
},
"product_reference": "httpd24-httpd-manual-0:2.4.25-9.el6.noarch",
"relates_to_product_reference": "6Server-RHSCL-2.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd24-httpd-tools-0:2.4.25-9.el6.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el6.x86_64"
},
"product_reference": "httpd24-httpd-tools-0:2.4.25-9.el6.x86_64",
"relates_to_product_reference": "6Server-RHSCL-2.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd24-mod_ldap-0:2.4.25-9.el6.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el6.x86_64"
},
"product_reference": "httpd24-mod_ldap-0:2.4.25-9.el6.x86_64",
"relates_to_product_reference": "6Server-RHSCL-2.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd24-mod_proxy_html-1:2.4.25-9.el6.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el6.x86_64"
},
"product_reference": "httpd24-mod_proxy_html-1:2.4.25-9.el6.x86_64",
"relates_to_product_reference": "6Server-RHSCL-2.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd24-mod_session-0:2.4.25-9.el6.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el6.x86_64"
},
"product_reference": "httpd24-mod_session-0:2.4.25-9.el6.x86_64",
"relates_to_product_reference": "6Server-RHSCL-2.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd24-mod_ssl-1:2.4.25-9.el6.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el6.x86_64"
},
"product_reference": "httpd24-mod_ssl-1:2.4.25-9.el6.x86_64",
"relates_to_product_reference": "6Server-RHSCL-2.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd24-httpd-0:2.4.25-9.el6.src as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.src"
},
"product_reference": "httpd24-httpd-0:2.4.25-9.el6.src",
"relates_to_product_reference": "6Workstation-RHSCL-2.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd24-httpd-0:2.4.25-9.el6.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.x86_64"
},
"product_reference": "httpd24-httpd-0:2.4.25-9.el6.x86_64",
"relates_to_product_reference": "6Workstation-RHSCL-2.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd24-httpd-debuginfo-0:2.4.25-9.el6.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el6.x86_64"
},
"product_reference": "httpd24-httpd-debuginfo-0:2.4.25-9.el6.x86_64",
"relates_to_product_reference": "6Workstation-RHSCL-2.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd24-httpd-devel-0:2.4.25-9.el6.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el6.x86_64"
},
"product_reference": "httpd24-httpd-devel-0:2.4.25-9.el6.x86_64",
"relates_to_product_reference": "6Workstation-RHSCL-2.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd24-httpd-manual-0:2.4.25-9.el6.noarch as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el6.noarch"
},
"product_reference": "httpd24-httpd-manual-0:2.4.25-9.el6.noarch",
"relates_to_product_reference": "6Workstation-RHSCL-2.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd24-httpd-tools-0:2.4.25-9.el6.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el6.x86_64"
},
"product_reference": "httpd24-httpd-tools-0:2.4.25-9.el6.x86_64",
"relates_to_product_reference": "6Workstation-RHSCL-2.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd24-mod_ldap-0:2.4.25-9.el6.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el6.x86_64"
},
"product_reference": "httpd24-mod_ldap-0:2.4.25-9.el6.x86_64",
"relates_to_product_reference": "6Workstation-RHSCL-2.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd24-mod_proxy_html-1:2.4.25-9.el6.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el6.x86_64"
},
"product_reference": "httpd24-mod_proxy_html-1:2.4.25-9.el6.x86_64",
"relates_to_product_reference": "6Workstation-RHSCL-2.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd24-mod_session-0:2.4.25-9.el6.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el6.x86_64"
},
"product_reference": "httpd24-mod_session-0:2.4.25-9.el6.x86_64",
"relates_to_product_reference": "6Workstation-RHSCL-2.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd24-mod_ssl-1:2.4.25-9.el6.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el6.x86_64"
},
"product_reference": "httpd24-mod_ssl-1:2.4.25-9.el6.x86_64",
"relates_to_product_reference": "6Workstation-RHSCL-2.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd24-httpd-0:2.4.25-9.el7.src as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-0:2.4.25-9.el7.src"
},
"product_reference": "httpd24-httpd-0:2.4.25-9.el7.src",
"relates_to_product_reference": "7Server-RHSCL-2.4-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd24-httpd-0:2.4.25-9.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-0:2.4.25-9.el7.x86_64"
},
"product_reference": "httpd24-httpd-0:2.4.25-9.el7.x86_64",
"relates_to_product_reference": "7Server-RHSCL-2.4-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd24-httpd-debuginfo-0:2.4.25-9.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-debuginfo-0:2.4.25-9.el7.x86_64"
},
"product_reference": "httpd24-httpd-debuginfo-0:2.4.25-9.el7.x86_64",
"relates_to_product_reference": "7Server-RHSCL-2.4-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd24-httpd-devel-0:2.4.25-9.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-devel-0:2.4.25-9.el7.x86_64"
},
"product_reference": "httpd24-httpd-devel-0:2.4.25-9.el7.x86_64",
"relates_to_product_reference": "7Server-RHSCL-2.4-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd24-httpd-manual-0:2.4.25-9.el7.noarch as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-manual-0:2.4.25-9.el7.noarch"
},
"product_reference": "httpd24-httpd-manual-0:2.4.25-9.el7.noarch",
"relates_to_product_reference": "7Server-RHSCL-2.4-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd24-httpd-tools-0:2.4.25-9.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-tools-0:2.4.25-9.el7.x86_64"
},
"product_reference": "httpd24-httpd-tools-0:2.4.25-9.el7.x86_64",
"relates_to_product_reference": "7Server-RHSCL-2.4-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd24-mod_ldap-0:2.4.25-9.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-RHSCL-2.4-7.3.Z:httpd24-mod_ldap-0:2.4.25-9.el7.x86_64"
},
"product_reference": "httpd24-mod_ldap-0:2.4.25-9.el7.x86_64",
"relates_to_product_reference": "7Server-RHSCL-2.4-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd24-mod_proxy_html-1:2.4.25-9.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-RHSCL-2.4-7.3.Z:httpd24-mod_proxy_html-1:2.4.25-9.el7.x86_64"
},
"product_reference": "httpd24-mod_proxy_html-1:2.4.25-9.el7.x86_64",
"relates_to_product_reference": "7Server-RHSCL-2.4-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd24-mod_session-0:2.4.25-9.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-RHSCL-2.4-7.3.Z:httpd24-mod_session-0:2.4.25-9.el7.x86_64"
},
"product_reference": "httpd24-mod_session-0:2.4.25-9.el7.x86_64",
"relates_to_product_reference": "7Server-RHSCL-2.4-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd24-mod_ssl-1:2.4.25-9.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-RHSCL-2.4-7.3.Z:httpd24-mod_ssl-1:2.4.25-9.el7.x86_64"
},
"product_reference": "httpd24-mod_ssl-1:2.4.25-9.el7.x86_64",
"relates_to_product_reference": "7Server-RHSCL-2.4-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd24-httpd-0:2.4.25-9.el7.src as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.src"
},
"product_reference": "httpd24-httpd-0:2.4.25-9.el7.src",
"relates_to_product_reference": "7Server-RHSCL-2.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd24-httpd-0:2.4.25-9.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.x86_64"
},
"product_reference": "httpd24-httpd-0:2.4.25-9.el7.x86_64",
"relates_to_product_reference": "7Server-RHSCL-2.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd24-httpd-debuginfo-0:2.4.25-9.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el7.x86_64"
},
"product_reference": "httpd24-httpd-debuginfo-0:2.4.25-9.el7.x86_64",
"relates_to_product_reference": "7Server-RHSCL-2.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd24-httpd-devel-0:2.4.25-9.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el7.x86_64"
},
"product_reference": "httpd24-httpd-devel-0:2.4.25-9.el7.x86_64",
"relates_to_product_reference": "7Server-RHSCL-2.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd24-httpd-manual-0:2.4.25-9.el7.noarch as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el7.noarch"
},
"product_reference": "httpd24-httpd-manual-0:2.4.25-9.el7.noarch",
"relates_to_product_reference": "7Server-RHSCL-2.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd24-httpd-tools-0:2.4.25-9.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el7.x86_64"
},
"product_reference": "httpd24-httpd-tools-0:2.4.25-9.el7.x86_64",
"relates_to_product_reference": "7Server-RHSCL-2.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd24-mod_ldap-0:2.4.25-9.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el7.x86_64"
},
"product_reference": "httpd24-mod_ldap-0:2.4.25-9.el7.x86_64",
"relates_to_product_reference": "7Server-RHSCL-2.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd24-mod_proxy_html-1:2.4.25-9.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el7.x86_64"
},
"product_reference": "httpd24-mod_proxy_html-1:2.4.25-9.el7.x86_64",
"relates_to_product_reference": "7Server-RHSCL-2.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd24-mod_session-0:2.4.25-9.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el7.x86_64"
},
"product_reference": "httpd24-mod_session-0:2.4.25-9.el7.x86_64",
"relates_to_product_reference": "7Server-RHSCL-2.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd24-mod_ssl-1:2.4.25-9.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el7.x86_64"
},
"product_reference": "httpd24-mod_ssl-1:2.4.25-9.el7.x86_64",
"relates_to_product_reference": "7Server-RHSCL-2.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd24-httpd-0:2.4.25-9.el7.src as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.src"
},
"product_reference": "httpd24-httpd-0:2.4.25-9.el7.src",
"relates_to_product_reference": "7Workstation-RHSCL-2.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd24-httpd-0:2.4.25-9.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.x86_64"
},
"product_reference": "httpd24-httpd-0:2.4.25-9.el7.x86_64",
"relates_to_product_reference": "7Workstation-RHSCL-2.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd24-httpd-debuginfo-0:2.4.25-9.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el7.x86_64"
},
"product_reference": "httpd24-httpd-debuginfo-0:2.4.25-9.el7.x86_64",
"relates_to_product_reference": "7Workstation-RHSCL-2.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd24-httpd-devel-0:2.4.25-9.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el7.x86_64"
},
"product_reference": "httpd24-httpd-devel-0:2.4.25-9.el7.x86_64",
"relates_to_product_reference": "7Workstation-RHSCL-2.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd24-httpd-manual-0:2.4.25-9.el7.noarch as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el7.noarch"
},
"product_reference": "httpd24-httpd-manual-0:2.4.25-9.el7.noarch",
"relates_to_product_reference": "7Workstation-RHSCL-2.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd24-httpd-tools-0:2.4.25-9.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el7.x86_64"
},
"product_reference": "httpd24-httpd-tools-0:2.4.25-9.el7.x86_64",
"relates_to_product_reference": "7Workstation-RHSCL-2.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd24-mod_ldap-0:2.4.25-9.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el7.x86_64"
},
"product_reference": "httpd24-mod_ldap-0:2.4.25-9.el7.x86_64",
"relates_to_product_reference": "7Workstation-RHSCL-2.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd24-mod_proxy_html-1:2.4.25-9.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el7.x86_64"
},
"product_reference": "httpd24-mod_proxy_html-1:2.4.25-9.el7.x86_64",
"relates_to_product_reference": "7Workstation-RHSCL-2.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd24-mod_session-0:2.4.25-9.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el7.x86_64"
},
"product_reference": "httpd24-mod_session-0:2.4.25-9.el7.x86_64",
"relates_to_product_reference": "7Workstation-RHSCL-2.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd24-mod_ssl-1:2.4.25-9.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el7.x86_64"
},
"product_reference": "httpd24-mod_ssl-1:2.4.25-9.el7.x86_64",
"relates_to_product_reference": "7Workstation-RHSCL-2.4"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2016-0736",
"cwe": {
"id": "CWE-287",
"name": "Improper Authentication"
},
"discovery_date": "2016-12-20T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1406744"
}
],
"notes": [
{
"category": "description",
"text": "It was discovered that the mod_session_crypto module of httpd did not use any mechanisms to verify integrity of the encrypted session data stored in the user\u0027s browser. A remote attacker could use this flaw to decrypt and modify session data using a padding oracle attack.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "httpd: Padding Oracle in Apache mod_session_crypto",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-0:2.4.25-9.el6.src",
"6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-0:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-debuginfo-0:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-devel-0:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-manual-0:2.4.25-9.el6.noarch",
"6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-tools-0:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4-6.7.Z:httpd24-mod_ldap-0:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4-6.7.Z:httpd24-mod_proxy_html-1:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4-6.7.Z:httpd24-mod_session-0:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4-6.7.Z:httpd24-mod_ssl-1:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.src",
"6Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el6.noarch",
"6Server-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el6.x86_64",
"6Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.src",
"6Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.x86_64",
"6Workstation-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el6.x86_64",
"6Workstation-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el6.x86_64",
"6Workstation-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el6.noarch",
"6Workstation-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el6.x86_64",
"6Workstation-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el6.x86_64",
"6Workstation-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el6.x86_64",
"6Workstation-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el6.x86_64",
"6Workstation-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el6.x86_64",
"7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-0:2.4.25-9.el7.src",
"7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-0:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-debuginfo-0:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-devel-0:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-manual-0:2.4.25-9.el7.noarch",
"7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-tools-0:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4-7.3.Z:httpd24-mod_ldap-0:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4-7.3.Z:httpd24-mod_proxy_html-1:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4-7.3.Z:httpd24-mod_session-0:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4-7.3.Z:httpd24-mod_ssl-1:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.src",
"7Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el7.noarch",
"7Server-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el7.x86_64",
"7Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.src",
"7Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.x86_64",
"7Workstation-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el7.x86_64",
"7Workstation-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el7.x86_64",
"7Workstation-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el7.noarch",
"7Workstation-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el7.x86_64",
"7Workstation-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el7.x86_64",
"7Workstation-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el7.x86_64",
"7Workstation-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el7.x86_64",
"7Workstation-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2016-0736"
},
{
"category": "external",
"summary": "RHBZ#1406744",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1406744"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2016-0736",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-0736"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-0736",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2016-0736"
},
{
"category": "external",
"summary": "https://httpd.apache.org/security/vulnerabilities_24.html#2.4.25",
"url": "https://httpd.apache.org/security/vulnerabilities_24.html#2.4.25"
},
{
"category": "external",
"summary": "https://www.redteam-pentesting.de/advisories/rt-sa-2016-001.txt",
"url": "https://www.redteam-pentesting.de/advisories/rt-sa-2016-001.txt"
}
],
"release_date": "2016-12-20T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2017-04-26T10:19:21+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically.",
"product_ids": [
"6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-0:2.4.25-9.el6.src",
"6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-0:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-debuginfo-0:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-devel-0:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-manual-0:2.4.25-9.el6.noarch",
"6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-tools-0:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4-6.7.Z:httpd24-mod_ldap-0:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4-6.7.Z:httpd24-mod_proxy_html-1:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4-6.7.Z:httpd24-mod_session-0:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4-6.7.Z:httpd24-mod_ssl-1:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.src",
"6Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el6.noarch",
"6Server-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el6.x86_64",
"6Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.src",
"6Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.x86_64",
"6Workstation-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el6.x86_64",
"6Workstation-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el6.x86_64",
"6Workstation-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el6.noarch",
"6Workstation-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el6.x86_64",
"6Workstation-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el6.x86_64",
"6Workstation-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el6.x86_64",
"6Workstation-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el6.x86_64",
"6Workstation-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el6.x86_64",
"7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-0:2.4.25-9.el7.src",
"7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-0:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-debuginfo-0:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-devel-0:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-manual-0:2.4.25-9.el7.noarch",
"7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-tools-0:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4-7.3.Z:httpd24-mod_ldap-0:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4-7.3.Z:httpd24-mod_proxy_html-1:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4-7.3.Z:httpd24-mod_session-0:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4-7.3.Z:httpd24-mod_ssl-1:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.src",
"7Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el7.noarch",
"7Server-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el7.x86_64",
"7Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.src",
"7Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.x86_64",
"7Workstation-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el7.x86_64",
"7Workstation-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el7.x86_64",
"7Workstation-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el7.noarch",
"7Workstation-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el7.x86_64",
"7Workstation-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el7.x86_64",
"7Workstation-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el7.x86_64",
"7Workstation-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el7.x86_64",
"7Workstation-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el7.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2017:1161"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "HIGH",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.0,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:H/Au:N/C:P/I:P/A:N",
"version": "2.0"
},
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N",
"version": "3.0"
},
"products": [
"6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-0:2.4.25-9.el6.src",
"6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-0:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-debuginfo-0:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-devel-0:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-manual-0:2.4.25-9.el6.noarch",
"6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-tools-0:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4-6.7.Z:httpd24-mod_ldap-0:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4-6.7.Z:httpd24-mod_proxy_html-1:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4-6.7.Z:httpd24-mod_session-0:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4-6.7.Z:httpd24-mod_ssl-1:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.src",
"6Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el6.noarch",
"6Server-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el6.x86_64",
"6Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.src",
"6Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.x86_64",
"6Workstation-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el6.x86_64",
"6Workstation-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el6.x86_64",
"6Workstation-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el6.noarch",
"6Workstation-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el6.x86_64",
"6Workstation-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el6.x86_64",
"6Workstation-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el6.x86_64",
"6Workstation-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el6.x86_64",
"6Workstation-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el6.x86_64",
"7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-0:2.4.25-9.el7.src",
"7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-0:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-debuginfo-0:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-devel-0:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-manual-0:2.4.25-9.el7.noarch",
"7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-tools-0:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4-7.3.Z:httpd24-mod_ldap-0:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4-7.3.Z:httpd24-mod_proxy_html-1:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4-7.3.Z:httpd24-mod_session-0:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4-7.3.Z:httpd24-mod_ssl-1:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.src",
"7Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el7.noarch",
"7Server-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el7.x86_64",
"7Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.src",
"7Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.x86_64",
"7Workstation-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el7.x86_64",
"7Workstation-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el7.x86_64",
"7Workstation-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el7.noarch",
"7Workstation-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el7.x86_64",
"7Workstation-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el7.x86_64",
"7Workstation-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el7.x86_64",
"7Workstation-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el7.x86_64",
"7Workstation-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "httpd: Padding Oracle in Apache mod_session_crypto"
},
{
"cve": "CVE-2016-1546",
"discovery_date": "2016-05-13T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1336350"
}
],
"notes": [
{
"category": "description",
"text": "A denial of service flaw was found in httpd\u0027s mod_http2 module. A remote attacker could use this flaw to block server threads for long times, causing starvation of worker threads, by manipulating the flow control windows on streams.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "httpd: mod_http2 denial-of-service by thread starvation",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-0:2.4.25-9.el6.src",
"6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-0:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-debuginfo-0:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-devel-0:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-manual-0:2.4.25-9.el6.noarch",
"6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-tools-0:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4-6.7.Z:httpd24-mod_ldap-0:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4-6.7.Z:httpd24-mod_proxy_html-1:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4-6.7.Z:httpd24-mod_session-0:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4-6.7.Z:httpd24-mod_ssl-1:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.src",
"6Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el6.noarch",
"6Server-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el6.x86_64",
"6Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.src",
"6Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.x86_64",
"6Workstation-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el6.x86_64",
"6Workstation-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el6.x86_64",
"6Workstation-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el6.noarch",
"6Workstation-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el6.x86_64",
"6Workstation-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el6.x86_64",
"6Workstation-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el6.x86_64",
"6Workstation-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el6.x86_64",
"6Workstation-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el6.x86_64",
"7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-0:2.4.25-9.el7.src",
"7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-0:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-debuginfo-0:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-devel-0:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-manual-0:2.4.25-9.el7.noarch",
"7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-tools-0:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4-7.3.Z:httpd24-mod_ldap-0:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4-7.3.Z:httpd24-mod_proxy_html-1:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4-7.3.Z:httpd24-mod_session-0:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4-7.3.Z:httpd24-mod_ssl-1:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.src",
"7Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el7.noarch",
"7Server-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el7.x86_64",
"7Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.src",
"7Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.x86_64",
"7Workstation-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el7.x86_64",
"7Workstation-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el7.x86_64",
"7Workstation-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el7.noarch",
"7Workstation-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el7.x86_64",
"7Workstation-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el7.x86_64",
"7Workstation-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el7.x86_64",
"7Workstation-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el7.x86_64",
"7Workstation-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2016-1546"
},
{
"category": "external",
"summary": "RHBZ#1336350",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1336350"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2016-1546",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1546"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-1546",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2016-1546"
},
{
"category": "external",
"summary": "http://httpd.apache.org/security/vulnerabilities_24.html",
"url": "http://httpd.apache.org/security/vulnerabilities_24.html"
}
],
"release_date": "2016-04-11T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2017-04-26T10:19:21+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically.",
"product_ids": [
"6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-0:2.4.25-9.el6.src",
"6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-0:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-debuginfo-0:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-devel-0:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-manual-0:2.4.25-9.el6.noarch",
"6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-tools-0:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4-6.7.Z:httpd24-mod_ldap-0:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4-6.7.Z:httpd24-mod_proxy_html-1:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4-6.7.Z:httpd24-mod_session-0:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4-6.7.Z:httpd24-mod_ssl-1:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.src",
"6Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el6.noarch",
"6Server-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el6.x86_64",
"6Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.src",
"6Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.x86_64",
"6Workstation-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el6.x86_64",
"6Workstation-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el6.x86_64",
"6Workstation-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el6.noarch",
"6Workstation-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el6.x86_64",
"6Workstation-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el6.x86_64",
"6Workstation-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el6.x86_64",
"6Workstation-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el6.x86_64",
"6Workstation-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el6.x86_64",
"7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-0:2.4.25-9.el7.src",
"7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-0:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-debuginfo-0:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-devel-0:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-manual-0:2.4.25-9.el7.noarch",
"7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-tools-0:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4-7.3.Z:httpd24-mod_ldap-0:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4-7.3.Z:httpd24-mod_proxy_html-1:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4-7.3.Z:httpd24-mod_session-0:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4-7.3.Z:httpd24-mod_ssl-1:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.src",
"7Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el7.noarch",
"7Server-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el7.x86_64",
"7Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.src",
"7Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.x86_64",
"7Workstation-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el7.x86_64",
"7Workstation-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el7.x86_64",
"7Workstation-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el7.noarch",
"7Workstation-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el7.x86_64",
"7Workstation-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el7.x86_64",
"7Workstation-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el7.x86_64",
"7Workstation-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el7.x86_64",
"7Workstation-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el7.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2017:1161"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"products": [
"6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-0:2.4.25-9.el6.src",
"6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-0:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-debuginfo-0:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-devel-0:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-manual-0:2.4.25-9.el6.noarch",
"6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-tools-0:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4-6.7.Z:httpd24-mod_ldap-0:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4-6.7.Z:httpd24-mod_proxy_html-1:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4-6.7.Z:httpd24-mod_session-0:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4-6.7.Z:httpd24-mod_ssl-1:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.src",
"6Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el6.noarch",
"6Server-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el6.x86_64",
"6Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.src",
"6Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.x86_64",
"6Workstation-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el6.x86_64",
"6Workstation-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el6.x86_64",
"6Workstation-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el6.noarch",
"6Workstation-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el6.x86_64",
"6Workstation-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el6.x86_64",
"6Workstation-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el6.x86_64",
"6Workstation-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el6.x86_64",
"6Workstation-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el6.x86_64",
"7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-0:2.4.25-9.el7.src",
"7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-0:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-debuginfo-0:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-devel-0:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-manual-0:2.4.25-9.el7.noarch",
"7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-tools-0:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4-7.3.Z:httpd24-mod_ldap-0:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4-7.3.Z:httpd24-mod_proxy_html-1:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4-7.3.Z:httpd24-mod_session-0:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4-7.3.Z:httpd24-mod_ssl-1:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.src",
"7Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el7.noarch",
"7Server-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el7.x86_64",
"7Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.src",
"7Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.x86_64",
"7Workstation-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el7.x86_64",
"7Workstation-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el7.x86_64",
"7Workstation-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el7.noarch",
"7Workstation-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el7.x86_64",
"7Workstation-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el7.x86_64",
"7Workstation-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el7.x86_64",
"7Workstation-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el7.x86_64",
"7Workstation-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "httpd: mod_http2 denial-of-service by thread starvation"
},
{
"cve": "CVE-2016-2161",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"discovery_date": "2016-12-20T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1406753"
}
],
"notes": [
{
"category": "description",
"text": "It was discovered that the mod_auth_digest module of httpd did not properly check for memory allocation failures. A remote attacker could use this flaw to cause httpd child processes to repeatedly crash if the server used HTTP digest authentication.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "httpd: DoS vulnerability in mod_auth_digest",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-0:2.4.25-9.el6.src",
"6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-0:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-debuginfo-0:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-devel-0:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-manual-0:2.4.25-9.el6.noarch",
"6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-tools-0:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4-6.7.Z:httpd24-mod_ldap-0:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4-6.7.Z:httpd24-mod_proxy_html-1:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4-6.7.Z:httpd24-mod_session-0:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4-6.7.Z:httpd24-mod_ssl-1:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.src",
"6Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el6.noarch",
"6Server-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el6.x86_64",
"6Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.src",
"6Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.x86_64",
"6Workstation-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el6.x86_64",
"6Workstation-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el6.x86_64",
"6Workstation-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el6.noarch",
"6Workstation-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el6.x86_64",
"6Workstation-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el6.x86_64",
"6Workstation-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el6.x86_64",
"6Workstation-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el6.x86_64",
"6Workstation-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el6.x86_64",
"7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-0:2.4.25-9.el7.src",
"7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-0:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-debuginfo-0:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-devel-0:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-manual-0:2.4.25-9.el7.noarch",
"7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-tools-0:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4-7.3.Z:httpd24-mod_ldap-0:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4-7.3.Z:httpd24-mod_proxy_html-1:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4-7.3.Z:httpd24-mod_session-0:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4-7.3.Z:httpd24-mod_ssl-1:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.src",
"7Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el7.noarch",
"7Server-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el7.x86_64",
"7Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.src",
"7Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.x86_64",
"7Workstation-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el7.x86_64",
"7Workstation-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el7.x86_64",
"7Workstation-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el7.noarch",
"7Workstation-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el7.x86_64",
"7Workstation-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el7.x86_64",
"7Workstation-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el7.x86_64",
"7Workstation-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el7.x86_64",
"7Workstation-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2016-2161"
},
{
"category": "external",
"summary": "RHBZ#1406753",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1406753"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2016-2161",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-2161"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-2161",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2016-2161"
},
{
"category": "external",
"summary": "https://httpd.apache.org/security/vulnerabilities_24.html#2.4.25",
"url": "https://httpd.apache.org/security/vulnerabilities_24.html#2.4.25"
}
],
"release_date": "2016-12-20T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2017-04-26T10:19:21+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically.",
"product_ids": [
"6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-0:2.4.25-9.el6.src",
"6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-0:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-debuginfo-0:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-devel-0:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-manual-0:2.4.25-9.el6.noarch",
"6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-tools-0:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4-6.7.Z:httpd24-mod_ldap-0:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4-6.7.Z:httpd24-mod_proxy_html-1:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4-6.7.Z:httpd24-mod_session-0:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4-6.7.Z:httpd24-mod_ssl-1:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.src",
"6Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el6.noarch",
"6Server-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el6.x86_64",
"6Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.src",
"6Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.x86_64",
"6Workstation-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el6.x86_64",
"6Workstation-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el6.x86_64",
"6Workstation-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el6.noarch",
"6Workstation-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el6.x86_64",
"6Workstation-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el6.x86_64",
"6Workstation-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el6.x86_64",
"6Workstation-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el6.x86_64",
"6Workstation-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el6.x86_64",
"7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-0:2.4.25-9.el7.src",
"7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-0:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-debuginfo-0:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-devel-0:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-manual-0:2.4.25-9.el7.noarch",
"7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-tools-0:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4-7.3.Z:httpd24-mod_ldap-0:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4-7.3.Z:httpd24-mod_proxy_html-1:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4-7.3.Z:httpd24-mod_session-0:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4-7.3.Z:httpd24-mod_ssl-1:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.src",
"7Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el7.noarch",
"7Server-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el7.x86_64",
"7Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.src",
"7Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.x86_64",
"7Workstation-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el7.x86_64",
"7Workstation-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el7.x86_64",
"7Workstation-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el7.noarch",
"7Workstation-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el7.x86_64",
"7Workstation-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el7.x86_64",
"7Workstation-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el7.x86_64",
"7Workstation-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el7.x86_64",
"7Workstation-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el7.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2017:1161"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-0:2.4.25-9.el6.src",
"6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-0:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-debuginfo-0:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-devel-0:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-manual-0:2.4.25-9.el6.noarch",
"6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-tools-0:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4-6.7.Z:httpd24-mod_ldap-0:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4-6.7.Z:httpd24-mod_proxy_html-1:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4-6.7.Z:httpd24-mod_session-0:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4-6.7.Z:httpd24-mod_ssl-1:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.src",
"6Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el6.noarch",
"6Server-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el6.x86_64",
"6Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.src",
"6Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.x86_64",
"6Workstation-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el6.x86_64",
"6Workstation-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el6.x86_64",
"6Workstation-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el6.noarch",
"6Workstation-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el6.x86_64",
"6Workstation-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el6.x86_64",
"6Workstation-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el6.x86_64",
"6Workstation-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el6.x86_64",
"6Workstation-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el6.x86_64",
"7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-0:2.4.25-9.el7.src",
"7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-0:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-debuginfo-0:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-devel-0:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-manual-0:2.4.25-9.el7.noarch",
"7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-tools-0:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4-7.3.Z:httpd24-mod_ldap-0:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4-7.3.Z:httpd24-mod_proxy_html-1:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4-7.3.Z:httpd24-mod_session-0:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4-7.3.Z:httpd24-mod_ssl-1:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.src",
"7Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el7.noarch",
"7Server-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el7.x86_64",
"7Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.src",
"7Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.x86_64",
"7Workstation-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el7.x86_64",
"7Workstation-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el7.x86_64",
"7Workstation-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el7.noarch",
"7Workstation-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el7.x86_64",
"7Workstation-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el7.x86_64",
"7Workstation-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el7.x86_64",
"7Workstation-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el7.x86_64",
"7Workstation-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "httpd: DoS vulnerability in mod_auth_digest"
},
{
"cve": "CVE-2016-8740",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"discovery_date": "2016-12-05T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1401528"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in httpd\u0027s handling of the LimitRequestFields directive in mod_http2, affecting servers with HTTP/2 enabled. An attacker could send crafted requests with headers larger than the server\u0027s available memory, causing httpd to crash.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "httpd: Incomplete handling of LimitRequestFields directive in mod_http2",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Product Security has rated this issue as having Low security\nimpact. This issue is not currently planned to be addressed in future\nupdates. For additional information, refer to the Issue Severity\nClassification: https://access.redhat.com/security/updates/classification/.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-0:2.4.25-9.el6.src",
"6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-0:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-debuginfo-0:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-devel-0:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-manual-0:2.4.25-9.el6.noarch",
"6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-tools-0:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4-6.7.Z:httpd24-mod_ldap-0:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4-6.7.Z:httpd24-mod_proxy_html-1:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4-6.7.Z:httpd24-mod_session-0:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4-6.7.Z:httpd24-mod_ssl-1:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.src",
"6Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el6.noarch",
"6Server-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el6.x86_64",
"6Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.src",
"6Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.x86_64",
"6Workstation-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el6.x86_64",
"6Workstation-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el6.x86_64",
"6Workstation-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el6.noarch",
"6Workstation-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el6.x86_64",
"6Workstation-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el6.x86_64",
"6Workstation-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el6.x86_64",
"6Workstation-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el6.x86_64",
"6Workstation-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el6.x86_64",
"7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-0:2.4.25-9.el7.src",
"7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-0:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-debuginfo-0:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-devel-0:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-manual-0:2.4.25-9.el7.noarch",
"7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-tools-0:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4-7.3.Z:httpd24-mod_ldap-0:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4-7.3.Z:httpd24-mod_proxy_html-1:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4-7.3.Z:httpd24-mod_session-0:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4-7.3.Z:httpd24-mod_ssl-1:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.src",
"7Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el7.noarch",
"7Server-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el7.x86_64",
"7Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.src",
"7Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.x86_64",
"7Workstation-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el7.x86_64",
"7Workstation-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el7.x86_64",
"7Workstation-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el7.noarch",
"7Workstation-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el7.x86_64",
"7Workstation-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el7.x86_64",
"7Workstation-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el7.x86_64",
"7Workstation-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el7.x86_64",
"7Workstation-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2016-8740"
},
{
"category": "external",
"summary": "RHBZ#1401528",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1401528"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2016-8740",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-8740"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-8740",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2016-8740"
},
{
"category": "external",
"summary": "http://seclists.org/bugtraq/2016/Dec/3",
"url": "http://seclists.org/bugtraq/2016/Dec/3"
},
{
"category": "external",
"summary": "https://httpd.apache.org/security/vulnerabilities_24.html",
"url": "https://httpd.apache.org/security/vulnerabilities_24.html"
}
],
"release_date": "2016-12-04T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2017-04-26T10:19:21+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically.",
"product_ids": [
"6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-0:2.4.25-9.el6.src",
"6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-0:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-debuginfo-0:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-devel-0:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-manual-0:2.4.25-9.el6.noarch",
"6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-tools-0:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4-6.7.Z:httpd24-mod_ldap-0:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4-6.7.Z:httpd24-mod_proxy_html-1:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4-6.7.Z:httpd24-mod_session-0:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4-6.7.Z:httpd24-mod_ssl-1:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.src",
"6Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el6.noarch",
"6Server-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el6.x86_64",
"6Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.src",
"6Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.x86_64",
"6Workstation-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el6.x86_64",
"6Workstation-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el6.x86_64",
"6Workstation-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el6.noarch",
"6Workstation-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el6.x86_64",
"6Workstation-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el6.x86_64",
"6Workstation-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el6.x86_64",
"6Workstation-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el6.x86_64",
"6Workstation-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el6.x86_64",
"7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-0:2.4.25-9.el7.src",
"7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-0:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-debuginfo-0:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-devel-0:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-manual-0:2.4.25-9.el7.noarch",
"7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-tools-0:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4-7.3.Z:httpd24-mod_ldap-0:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4-7.3.Z:httpd24-mod_proxy_html-1:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4-7.3.Z:httpd24-mod_session-0:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4-7.3.Z:httpd24-mod_ssl-1:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.src",
"7Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el7.noarch",
"7Server-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el7.x86_64",
"7Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.src",
"7Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.x86_64",
"7Workstation-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el7.x86_64",
"7Workstation-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el7.x86_64",
"7Workstation-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el7.noarch",
"7Workstation-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el7.x86_64",
"7Workstation-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el7.x86_64",
"7Workstation-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el7.x86_64",
"7Workstation-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el7.x86_64",
"7Workstation-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el7.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2017:1161"
},
{
"category": "workaround",
"details": "As a temporary workaround - HTTP/2 can be disabled by changing\nthe configuration by removing h2 and h2c from the Protocols\nline(s) in the configuration file. \n\nThe resulting line should read:\n\n\t\tProtocols http/1.1",
"product_ids": [
"6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-0:2.4.25-9.el6.src",
"6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-0:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-debuginfo-0:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-devel-0:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-manual-0:2.4.25-9.el6.noarch",
"6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-tools-0:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4-6.7.Z:httpd24-mod_ldap-0:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4-6.7.Z:httpd24-mod_proxy_html-1:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4-6.7.Z:httpd24-mod_session-0:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4-6.7.Z:httpd24-mod_ssl-1:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.src",
"6Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el6.noarch",
"6Server-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el6.x86_64",
"6Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.src",
"6Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.x86_64",
"6Workstation-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el6.x86_64",
"6Workstation-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el6.x86_64",
"6Workstation-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el6.noarch",
"6Workstation-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el6.x86_64",
"6Workstation-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el6.x86_64",
"6Workstation-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el6.x86_64",
"6Workstation-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el6.x86_64",
"6Workstation-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el6.x86_64",
"7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-0:2.4.25-9.el7.src",
"7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-0:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-debuginfo-0:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-devel-0:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-manual-0:2.4.25-9.el7.noarch",
"7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-tools-0:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4-7.3.Z:httpd24-mod_ldap-0:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4-7.3.Z:httpd24-mod_proxy_html-1:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4-7.3.Z:httpd24-mod_session-0:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4-7.3.Z:httpd24-mod_ssl-1:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.src",
"7Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el7.noarch",
"7Server-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el7.x86_64",
"7Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.src",
"7Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.x86_64",
"7Workstation-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el7.x86_64",
"7Workstation-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el7.x86_64",
"7Workstation-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el7.noarch",
"7Workstation-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el7.x86_64",
"7Workstation-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el7.x86_64",
"7Workstation-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el7.x86_64",
"7Workstation-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el7.x86_64",
"7Workstation-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el7.x86_64"
]
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-0:2.4.25-9.el6.src",
"6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-0:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-debuginfo-0:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-devel-0:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-manual-0:2.4.25-9.el6.noarch",
"6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-tools-0:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4-6.7.Z:httpd24-mod_ldap-0:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4-6.7.Z:httpd24-mod_proxy_html-1:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4-6.7.Z:httpd24-mod_session-0:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4-6.7.Z:httpd24-mod_ssl-1:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.src",
"6Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el6.noarch",
"6Server-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el6.x86_64",
"6Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.src",
"6Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.x86_64",
"6Workstation-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el6.x86_64",
"6Workstation-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el6.x86_64",
"6Workstation-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el6.noarch",
"6Workstation-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el6.x86_64",
"6Workstation-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el6.x86_64",
"6Workstation-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el6.x86_64",
"6Workstation-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el6.x86_64",
"6Workstation-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el6.x86_64",
"7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-0:2.4.25-9.el7.src",
"7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-0:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-debuginfo-0:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-devel-0:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-manual-0:2.4.25-9.el7.noarch",
"7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-tools-0:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4-7.3.Z:httpd24-mod_ldap-0:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4-7.3.Z:httpd24-mod_proxy_html-1:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4-7.3.Z:httpd24-mod_session-0:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4-7.3.Z:httpd24-mod_ssl-1:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.src",
"7Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el7.noarch",
"7Server-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el7.x86_64",
"7Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.src",
"7Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.x86_64",
"7Workstation-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el7.x86_64",
"7Workstation-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el7.x86_64",
"7Workstation-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el7.noarch",
"7Workstation-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el7.x86_64",
"7Workstation-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el7.x86_64",
"7Workstation-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el7.x86_64",
"7Workstation-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el7.x86_64",
"7Workstation-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "httpd: Incomplete handling of LimitRequestFields directive in mod_http2"
},
{
"cve": "CVE-2016-8743",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"discovery_date": "2016-12-20T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1406822"
}
],
"notes": [
{
"category": "description",
"text": "It was discovered that the HTTP parser in httpd incorrectly allowed certain characters not permitted by the HTTP protocol specification to appear unencoded in HTTP request headers. If httpd was used in conjunction with a proxy or backend server that interpreted those characters differently, a remote attacker could possibly use this flaw to inject data into HTTP responses, resulting in proxy cache poisoning.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "httpd: Apache HTTP Request Parsing Whitespace Defects",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-0:2.4.25-9.el6.src",
"6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-0:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-debuginfo-0:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-devel-0:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-manual-0:2.4.25-9.el6.noarch",
"6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-tools-0:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4-6.7.Z:httpd24-mod_ldap-0:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4-6.7.Z:httpd24-mod_proxy_html-1:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4-6.7.Z:httpd24-mod_session-0:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4-6.7.Z:httpd24-mod_ssl-1:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.src",
"6Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el6.noarch",
"6Server-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el6.x86_64",
"6Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.src",
"6Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.x86_64",
"6Workstation-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el6.x86_64",
"6Workstation-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el6.x86_64",
"6Workstation-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el6.noarch",
"6Workstation-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el6.x86_64",
"6Workstation-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el6.x86_64",
"6Workstation-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el6.x86_64",
"6Workstation-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el6.x86_64",
"6Workstation-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el6.x86_64",
"7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-0:2.4.25-9.el7.src",
"7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-0:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-debuginfo-0:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-devel-0:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-manual-0:2.4.25-9.el7.noarch",
"7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-tools-0:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4-7.3.Z:httpd24-mod_ldap-0:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4-7.3.Z:httpd24-mod_proxy_html-1:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4-7.3.Z:httpd24-mod_session-0:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4-7.3.Z:httpd24-mod_ssl-1:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.src",
"7Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el7.noarch",
"7Server-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el7.x86_64",
"7Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.src",
"7Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.x86_64",
"7Workstation-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el7.x86_64",
"7Workstation-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el7.x86_64",
"7Workstation-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el7.noarch",
"7Workstation-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el7.x86_64",
"7Workstation-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el7.x86_64",
"7Workstation-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el7.x86_64",
"7Workstation-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el7.x86_64",
"7Workstation-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2016-8743"
},
{
"category": "external",
"summary": "RHBZ#1406822",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1406822"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2016-8743",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-8743"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-8743",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2016-8743"
},
{
"category": "external",
"summary": "https://httpd.apache.org/security/vulnerabilities_24.html#2.4.25",
"url": "https://httpd.apache.org/security/vulnerabilities_24.html#2.4.25"
}
],
"release_date": "2016-12-20T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2017-04-26T10:19:21+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically.",
"product_ids": [
"6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-0:2.4.25-9.el6.src",
"6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-0:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-debuginfo-0:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-devel-0:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-manual-0:2.4.25-9.el6.noarch",
"6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-tools-0:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4-6.7.Z:httpd24-mod_ldap-0:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4-6.7.Z:httpd24-mod_proxy_html-1:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4-6.7.Z:httpd24-mod_session-0:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4-6.7.Z:httpd24-mod_ssl-1:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.src",
"6Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el6.noarch",
"6Server-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el6.x86_64",
"6Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.src",
"6Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.x86_64",
"6Workstation-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el6.x86_64",
"6Workstation-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el6.x86_64",
"6Workstation-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el6.noarch",
"6Workstation-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el6.x86_64",
"6Workstation-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el6.x86_64",
"6Workstation-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el6.x86_64",
"6Workstation-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el6.x86_64",
"6Workstation-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el6.x86_64",
"7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-0:2.4.25-9.el7.src",
"7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-0:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-debuginfo-0:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-devel-0:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-manual-0:2.4.25-9.el7.noarch",
"7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-tools-0:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4-7.3.Z:httpd24-mod_ldap-0:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4-7.3.Z:httpd24-mod_proxy_html-1:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4-7.3.Z:httpd24-mod_session-0:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4-7.3.Z:httpd24-mod_ssl-1:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.src",
"7Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el7.noarch",
"7Server-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el7.x86_64",
"7Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.src",
"7Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.x86_64",
"7Workstation-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el7.x86_64",
"7Workstation-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el7.x86_64",
"7Workstation-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el7.noarch",
"7Workstation-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el7.x86_64",
"7Workstation-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el7.x86_64",
"7Workstation-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el7.x86_64",
"7Workstation-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el7.x86_64",
"7Workstation-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el7.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2017:1161"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"version": "2.0"
},
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 4.0,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:L/A:N",
"version": "3.0"
},
"products": [
"6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-0:2.4.25-9.el6.src",
"6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-0:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-debuginfo-0:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-devel-0:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-manual-0:2.4.25-9.el6.noarch",
"6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-tools-0:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4-6.7.Z:httpd24-mod_ldap-0:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4-6.7.Z:httpd24-mod_proxy_html-1:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4-6.7.Z:httpd24-mod_session-0:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4-6.7.Z:httpd24-mod_ssl-1:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.src",
"6Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el6.noarch",
"6Server-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el6.x86_64",
"6Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.src",
"6Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.x86_64",
"6Workstation-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el6.x86_64",
"6Workstation-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el6.x86_64",
"6Workstation-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el6.noarch",
"6Workstation-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el6.x86_64",
"6Workstation-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el6.x86_64",
"6Workstation-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el6.x86_64",
"6Workstation-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el6.x86_64",
"6Workstation-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el6.x86_64",
"7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-0:2.4.25-9.el7.src",
"7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-0:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-debuginfo-0:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-devel-0:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-manual-0:2.4.25-9.el7.noarch",
"7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-tools-0:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4-7.3.Z:httpd24-mod_ldap-0:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4-7.3.Z:httpd24-mod_proxy_html-1:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4-7.3.Z:httpd24-mod_session-0:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4-7.3.Z:httpd24-mod_ssl-1:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.src",
"7Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el7.noarch",
"7Server-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el7.x86_64",
"7Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.src",
"7Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.x86_64",
"7Workstation-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el7.x86_64",
"7Workstation-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el7.x86_64",
"7Workstation-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el7.noarch",
"7Workstation-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el7.x86_64",
"7Workstation-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el7.x86_64",
"7Workstation-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el7.x86_64",
"7Workstation-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el7.x86_64",
"7Workstation-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "httpd: Apache HTTP Request Parsing Whitespace Defects"
},
{
"acknowledgments": [
{
"names": [
"the Apache project"
]
}
],
"cve": "CVE-2020-11985",
"cwe": {
"id": "CWE-345",
"name": "Insufficient Verification of Data Authenticity"
},
"discovery_date": "2020-08-05T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1866559"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the mod_remoteip module shipped with the httpd package. This flaw allows an attacker to spoof the IP address, resulting in the bypass of a mod_rewrite rule. The highest threat from this vulnerability is to integrity.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "httpd: IP address spoofing when proxying using mod_remoteip and mod_rewrite",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue only affects httpd-2.4.x, therefore, httpd packages shipped with Red Hat Enterprise Linux 6 are not affected by this flaw.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-0:2.4.25-9.el6.src",
"6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-0:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-debuginfo-0:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-devel-0:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-manual-0:2.4.25-9.el6.noarch",
"6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-tools-0:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4-6.7.Z:httpd24-mod_ldap-0:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4-6.7.Z:httpd24-mod_proxy_html-1:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4-6.7.Z:httpd24-mod_session-0:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4-6.7.Z:httpd24-mod_ssl-1:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.src",
"6Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el6.noarch",
"6Server-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el6.x86_64",
"6Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.src",
"6Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.x86_64",
"6Workstation-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el6.x86_64",
"6Workstation-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el6.x86_64",
"6Workstation-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el6.noarch",
"6Workstation-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el6.x86_64",
"6Workstation-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el6.x86_64",
"6Workstation-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el6.x86_64",
"6Workstation-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el6.x86_64",
"6Workstation-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el6.x86_64",
"7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-0:2.4.25-9.el7.src",
"7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-0:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-debuginfo-0:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-devel-0:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-manual-0:2.4.25-9.el7.noarch",
"7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-tools-0:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4-7.3.Z:httpd24-mod_ldap-0:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4-7.3.Z:httpd24-mod_proxy_html-1:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4-7.3.Z:httpd24-mod_session-0:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4-7.3.Z:httpd24-mod_ssl-1:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.src",
"7Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el7.noarch",
"7Server-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el7.x86_64",
"7Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.src",
"7Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.x86_64",
"7Workstation-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el7.x86_64",
"7Workstation-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el7.x86_64",
"7Workstation-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el7.noarch",
"7Workstation-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el7.x86_64",
"7Workstation-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el7.x86_64",
"7Workstation-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el7.x86_64",
"7Workstation-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el7.x86_64",
"7Workstation-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-11985"
},
{
"category": "external",
"summary": "RHBZ#1866559",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1866559"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-11985",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-11985"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-11985",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-11985"
},
{
"category": "external",
"summary": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2020-11985",
"url": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2020-11985"
}
],
"release_date": "2020-08-07T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2017-04-26T10:19:21+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically.",
"product_ids": [
"6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-0:2.4.25-9.el6.src",
"6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-0:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-debuginfo-0:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-devel-0:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-manual-0:2.4.25-9.el6.noarch",
"6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-tools-0:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4-6.7.Z:httpd24-mod_ldap-0:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4-6.7.Z:httpd24-mod_proxy_html-1:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4-6.7.Z:httpd24-mod_session-0:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4-6.7.Z:httpd24-mod_ssl-1:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.src",
"6Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el6.noarch",
"6Server-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el6.x86_64",
"6Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.src",
"6Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.x86_64",
"6Workstation-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el6.x86_64",
"6Workstation-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el6.x86_64",
"6Workstation-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el6.noarch",
"6Workstation-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el6.x86_64",
"6Workstation-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el6.x86_64",
"6Workstation-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el6.x86_64",
"6Workstation-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el6.x86_64",
"6Workstation-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el6.x86_64",
"7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-0:2.4.25-9.el7.src",
"7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-0:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-debuginfo-0:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-devel-0:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-manual-0:2.4.25-9.el7.noarch",
"7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-tools-0:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4-7.3.Z:httpd24-mod_ldap-0:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4-7.3.Z:httpd24-mod_proxy_html-1:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4-7.3.Z:httpd24-mod_session-0:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4-7.3.Z:httpd24-mod_ssl-1:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.src",
"7Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el7.noarch",
"7Server-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el7.x86_64",
"7Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.src",
"7Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.x86_64",
"7Workstation-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el7.x86_64",
"7Workstation-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el7.x86_64",
"7Workstation-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el7.noarch",
"7Workstation-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el7.x86_64",
"7Workstation-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el7.x86_64",
"7Workstation-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el7.x86_64",
"7Workstation-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el7.x86_64",
"7Workstation-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el7.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2017:1161"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
"version": "3.1"
},
"products": [
"6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-0:2.4.25-9.el6.src",
"6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-0:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-debuginfo-0:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-devel-0:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-manual-0:2.4.25-9.el6.noarch",
"6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-tools-0:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4-6.7.Z:httpd24-mod_ldap-0:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4-6.7.Z:httpd24-mod_proxy_html-1:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4-6.7.Z:httpd24-mod_session-0:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4-6.7.Z:httpd24-mod_ssl-1:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.src",
"6Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el6.noarch",
"6Server-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el6.x86_64",
"6Server-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el6.x86_64",
"6Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.src",
"6Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.x86_64",
"6Workstation-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el6.x86_64",
"6Workstation-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el6.x86_64",
"6Workstation-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el6.noarch",
"6Workstation-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el6.x86_64",
"6Workstation-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el6.x86_64",
"6Workstation-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el6.x86_64",
"6Workstation-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el6.x86_64",
"6Workstation-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el6.x86_64",
"7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-0:2.4.25-9.el7.src",
"7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-0:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-debuginfo-0:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-devel-0:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-manual-0:2.4.25-9.el7.noarch",
"7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-tools-0:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4-7.3.Z:httpd24-mod_ldap-0:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4-7.3.Z:httpd24-mod_proxy_html-1:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4-7.3.Z:httpd24-mod_session-0:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4-7.3.Z:httpd24-mod_ssl-1:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.src",
"7Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el7.noarch",
"7Server-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el7.x86_64",
"7Server-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el7.x86_64",
"7Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.src",
"7Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.x86_64",
"7Workstation-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el7.x86_64",
"7Workstation-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el7.x86_64",
"7Workstation-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el7.noarch",
"7Workstation-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el7.x86_64",
"7Workstation-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el7.x86_64",
"7Workstation-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el7.x86_64",
"7Workstation-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el7.x86_64",
"7Workstation-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "httpd: IP address spoofing when proxying using mod_remoteip and mod_rewrite"
}
]
}
Sightings
| Author | Source | Type | Date | Other |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.