Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2022-28614
Vulnerability from cvelistv5
Published
2022-06-08 10:00
Modified
2024-08-03 05:56
Severity ?
EPSS score ?
Summary
The ap_rwrite() function in Apache HTTP Server 2.4.53 and earlier may read unintended memory if an attacker can cause the server to reflect very large input using ap_rwrite() or ap_rputs(), such as with mod_luas r:puts() function. Modules compiled and distributed separately from Apache HTTP Server that use the 'ap_rputs' function and may pass it a very large (INT_MAX or larger) string must be compiled against current headers to resolve the issue.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | Apache Software Foundation | Apache HTTP Server |
Version: unspecified < |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T05:56:16.107Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://httpd.apache.org/security/vulnerabilities_24.html" }, { "name": "[oss-security] 20220608 CVE-2022-28614: Apache HTTP Server: read beyond bounds via ap_rwrite()", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2022/06/08/4" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://security.netapp.com/advisory/ntap-20220624-0005/" }, { "name": "FEDORA-2022-e620fb15d5", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YPY2BLEVJWFH34AX77ZJPLD2OOBYR6ND/" }, { "name": "FEDORA-2022-b54a8dee29", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7QUGG2QZWHTITMABFLVXA4DNYUOTPWYQ/" }, { "name": "GLSA-202208-20", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "https://security.gentoo.org/glsa/202208-20" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Apache HTTP Server", "vendor": "Apache Software Foundation", "versions": [ { "lessThanOrEqual": "2.4.53", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "credits": [ { "lang": "en", "value": "The Apache HTTP Server project would like to thank Ronald Crane (Zippenhop LLC) for reporting this issue" } ], "descriptions": [ { "lang": "en", "value": "The ap_rwrite() function in Apache HTTP Server 2.4.53 and earlier may read unintended memory if an attacker can cause the server to reflect very large input using ap_rwrite() or ap_rputs(), such as with mod_luas r:puts() function. Modules compiled and distributed separately from Apache HTTP Server that use the \u0027ap_rputs\u0027 function and may pass it a very large (INT_MAX or larger) string must be compiled against current headers to resolve the issue." } ], "metrics": [ { "other": { "content": { "other": "low" }, "type": "unknown" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-190", "description": "CWE-190 Integer Overflow or Wraparound", "lang": "en", "type": "CWE" } ] }, { "descriptions": [ { "cweId": "CWE-200", "description": "CWE-200 Exposure of Sensitive Information to an Unauthorized Actor", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-08-14T01:06:39", "orgId": "f0158376-9dc2-43b6-827c-5f631a4d8d09", "shortName": "apache" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://httpd.apache.org/security/vulnerabilities_24.html" }, { "name": "[oss-security] 20220608 CVE-2022-28614: Apache HTTP Server: read beyond bounds via ap_rwrite()", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openwall.com/lists/oss-security/2022/06/08/4" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://security.netapp.com/advisory/ntap-20220624-0005/" }, { "name": "FEDORA-2022-e620fb15d5", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YPY2BLEVJWFH34AX77ZJPLD2OOBYR6ND/" }, { "name": "FEDORA-2022-b54a8dee29", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7QUGG2QZWHTITMABFLVXA4DNYUOTPWYQ/" }, { "name": "GLSA-202208-20", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "https://security.gentoo.org/glsa/202208-20" } ], "source": { "discovery": "UNKNOWN" }, "timeline": [ { "lang": "en", "time": "2022-06-08T00:00:00", "value": "released in 2.4.54" } ], "title": "read beyond bounds via ap_rwrite() ", "x_generator": { "engine": "Vulnogram 0.0.9" }, "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@apache.org", "ID": "CVE-2022-28614", "STATE": "PUBLIC", "TITLE": "read beyond bounds via ap_rwrite() " }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Apache HTTP Server", "version": { "version_data": [ { "version_affected": "\u003c=", "version_value": "2.4.53" } ] } } ] }, "vendor_name": "Apache Software Foundation" } ] } }, "credit": [ { "lang": "eng", "value": "The Apache HTTP Server project would like to thank Ronald Crane (Zippenhop LLC) for reporting this issue" } ], "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The ap_rwrite() function in Apache HTTP Server 2.4.53 and earlier may read unintended memory if an attacker can cause the server to reflect very large input using ap_rwrite() or ap_rputs(), such as with mod_luas r:puts() function. Modules compiled and distributed separately from Apache HTTP Server that use the \u0027ap_rputs\u0027 function and may pass it a very large (INT_MAX or larger) string must be compiled against current headers to resolve the issue." } ] }, "generator": { "engine": "Vulnogram 0.0.9" }, "impact": [ { "other": "low" } ], "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-190 Integer Overflow or Wraparound" } ] }, { "description": [ { "lang": "eng", "value": "CWE-200 Exposure of Sensitive Information to an Unauthorized Actor" } ] } ] }, "references": { "reference_data": [ { "name": "https://httpd.apache.org/security/vulnerabilities_24.html", "refsource": "MISC", "url": "https://httpd.apache.org/security/vulnerabilities_24.html" }, { "name": "[oss-security] 20220608 CVE-2022-28614: Apache HTTP Server: read beyond bounds via ap_rwrite()", "refsource": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2022/06/08/4" }, { "name": "https://security.netapp.com/advisory/ntap-20220624-0005/", "refsource": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20220624-0005/" }, { "name": "FEDORA-2022-e620fb15d5", "refsource": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YPY2BLEVJWFH34AX77ZJPLD2OOBYR6ND/" }, { "name": "FEDORA-2022-b54a8dee29", "refsource": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7QUGG2QZWHTITMABFLVXA4DNYUOTPWYQ/" }, { "name": "GLSA-202208-20", "refsource": "GENTOO", "url": "https://security.gentoo.org/glsa/202208-20" } ] }, "source": { "discovery": "UNKNOWN" }, "timeline": [ { "lang": "en", "time": "2022-06-08T00:00:00", "value": "released in 2.4.54" } ] } } }, "cveMetadata": { "assignerOrgId": "f0158376-9dc2-43b6-827c-5f631a4d8d09", "assignerShortName": "apache", "cveId": "CVE-2022-28614", "datePublished": "2022-06-08T10:00:48", "dateReserved": "2022-04-04T00:00:00", "dateUpdated": "2024-08-03T05:56:16.107Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "vulnerability-lookup:meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2022-28614\",\"sourceIdentifier\":\"security@apache.org\",\"published\":\"2022-06-09T17:15:09.180\",\"lastModified\":\"2024-11-21T06:57:35.057\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"The ap_rwrite() function in Apache HTTP Server 2.4.53 and earlier may read unintended memory if an attacker can cause the server to reflect very large input using ap_rwrite() or ap_rputs(), such as with mod_luas r:puts() function. Modules compiled and distributed separately from Apache HTTP Server that use the \u0027ap_rputs\u0027 function and may pass it a very large (INT_MAX or larger) string must be compiled against current headers to resolve the issue.\"},{\"lang\":\"es\",\"value\":\"La funci\u00f3n ap_rwrite() en el Servidor HTTP Apache 2.4.53 y anteriores puede leer memoria no intencionada si un atacante puede hacer que el servidor refleje una entrada muy grande usando ap_rwrite() o ap_rputs(), como con la funci\u00f3n mod_luas r:puts(). Los m\u00f3dulos compilados y distribuidos por separado del Servidor HTTP Apache que usan la funci\u00f3n \u0027ap_rputs\u0027 y pueden pasarle una cadena muy grande (INT_MAX o mayor) deben ser compilados contra las cabeceras actuales para resolver el problema\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N\",\"baseScore\":5.3,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"LOW\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":3.9,\"impactScore\":1.4}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:N/C:P/I:N/A:N\",\"baseScore\":5.0,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"NONE\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":10.0,\"impactScore\":2.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"security@apache.org\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-190\"},{\"lang\":\"en\",\"value\":\"CWE-200\"}]},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-190\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:http_server:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"2.4.53\",\"matchCriteriaId\":\"B39537A1-5A13-491A-B333-BB53FF718EA7\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"80E516C0-98A4-4ADE-B69F-66A772E2BAAA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:fedoraproject:fedora:36:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5C675112-476C-4D7C-BCB9-A2FB2D0BC9FD\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netapp:clustered_data_ontap:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1FE996B1-6951-4F85-AA58-B99A379D2163\"}]}]}],\"references\":[{\"url\":\"http://www.openwall.com/lists/oss-security/2022/06/08/4\",\"source\":\"security@apache.org\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://httpd.apache.org/security/vulnerabilities_24.html\",\"source\":\"security@apache.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7QUGG2QZWHTITMABFLVXA4DNYUOTPWYQ/\",\"source\":\"security@apache.org\"},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YPY2BLEVJWFH34AX77ZJPLD2OOBYR6ND/\",\"source\":\"security@apache.org\"},{\"url\":\"https://security.gentoo.org/glsa/202208-20\",\"source\":\"security@apache.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://security.netapp.com/advisory/ntap-20220624-0005/\",\"source\":\"security@apache.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.openwall.com/lists/oss-security/2022/06/08/4\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://httpd.apache.org/security/vulnerabilities_24.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7QUGG2QZWHTITMABFLVXA4DNYUOTPWYQ/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YPY2BLEVJWFH34AX77ZJPLD2OOBYR6ND/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://security.gentoo.org/glsa/202208-20\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://security.netapp.com/advisory/ntap-20220624-0005/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]}]}}" } }
ghsa-r4hp-h998-37fc
Vulnerability from github
Published
2022-06-10 00:00
Modified
2022-06-17 00:01
Severity ?
Details
The ap_rwrite() function in Apache HTTP Server 2.4.53 and earlier may read unintended memory if an attacker can cause the server to reflect very large input using ap_rwrite() or ap_rputs(), such as with mod_luas r:puts() function.
{ "affected": [], "aliases": [ "CVE-2022-28614" ], "database_specific": { "cwe_ids": [ "CWE-190" ], "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2022-06-09T17:15:00Z", "severity": "MODERATE" }, "details": "The ap_rwrite() function in Apache HTTP Server 2.4.53 and earlier may read unintended memory if an attacker can cause the server to reflect very large input using ap_rwrite() or ap_rputs(), such as with mod_luas r:puts() function.", "id": "GHSA-r4hp-h998-37fc", "modified": "2022-06-17T00:01:28Z", "published": "2022-06-10T00:00:55Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-28614" }, { "type": "WEB", "url": "https://httpd.apache.org/security/vulnerabilities_24.html" }, { "type": "WEB", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7QUGG2QZWHTITMABFLVXA4DNYUOTPWYQ" }, { "type": "WEB", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YPY2BLEVJWFH34AX77ZJPLD2OOBYR6ND" }, { "type": "WEB", "url": "https://security.gentoo.org/glsa/202208-20" }, { "type": "WEB", "url": "https://security.netapp.com/advisory/ntap-20220624-0005" }, { "type": "WEB", "url": "http://www.openwall.com/lists/oss-security/2022/06/08/4" } ], "schema_version": "1.4.0", "severity": [ { "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "type": "CVSS_V3" } ] }
rhsa-2022_8841
Vulnerability from csaf_redhat
Published
2022-12-08 13:21
Modified
2024-12-15 21:10
Summary
Red Hat Security Advisory: Red Hat JBoss Core Services Apache HTTP Server 2.4.51 SP1 security update
Notes
Topic
An update is now available for Red Hat JBoss Core Services Apache HTTP Server 2.4.51 Service Pack 1.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
Red Hat JBoss Core Services is a set of supplementary software for Red Hat JBoss middleware products. This software, such as Apache HTTP Server, is common to multiple JBoss middleware products, and is packaged under Red Hat JBoss Core Services to allow for faster distribution of updates, and for a more consistent update experience.
This release of Red Hat JBoss Core Services Apache HTTP Server 2.4.51 Service Pack 1 serves as a replacement for Red Hat JBoss Core Services Apache HTTP Server 2.4.51, and includes bug fixes and enhancements, which are documented in the Release Notes document linked to in the References.
Security Fix(es):
* httpd: mod_sed: Read/write beyond bounds (CVE-2022-23943)
* expat: a use-after-free in the doContent function in xmlparse.c (CVE-2022-40674)
* openssl: c_rehash script allows command injection (CVE-2022-1292)
* openssl: the c_rehash script allows command injection (CVE-2022-2068)
* httpd: core: Possible buffer overflow with very large or unlimited LimitXMLRequestBody (CVE-2022-22721)
* httpd: mod_proxy_ajp: Possible request smuggling (CVE-2022-26377)
* libxml2: integer overflows in xmlBuf and xmlBuffer lead to out-of-bounds write (CVE-2022-29824)
* httpd: mod_sed: DoS vulnerability (CVE-2022-30522)
* httpd: mod_proxy: X-Forwarded-For dropped by hop-by-hop mechanism (CVE-2022-31813)
* curl: HTTP compression denial of service (CVE-2022-32206)
* curl: Unpreserved file permissions (CVE-2022-32207)
* curl: FTP-KRB bad message verification (CVE-2022-32208)
* curl: POST following PUT confusion (CVE-2022-32221)
* zlib: heap-based buffer over-read and overflow in inflate() in inflate.c via a large gzip header extra field (CVE-2022-37434)
* libxml2: integer overflows with XML_PARSE_HUGE (CVE-2022-40303)
* libxml2: dict corruption caused by entity reference cycles (CVE-2022-40304)
* curl: HTTP proxy double-free (CVE-2022-42915)
* curl: HSTS bypass via IDN (CVE-2022-42916)
* curl: CERTINFO never-ending busy-loop (CVE-2022-27781)
* httpd: mod_isapi: out-of-bounds read (CVE-2022-28330)
* httpd: Out-of-bounds read via ap_rwrite() (CVE-2022-28614)
* httpd: Out-of-bounds read in ap_strcmp_match() (CVE-2022-28615)
* curl: control code in cookie denial of service (CVE-2022-35252)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update is now available for Red Hat JBoss Core Services Apache HTTP Server 2.4.51 Service Pack 1.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Red Hat JBoss Core Services is a set of supplementary software for Red Hat JBoss middleware products. This software, such as Apache HTTP Server, is common to multiple JBoss middleware products, and is packaged under Red Hat JBoss Core Services to allow for faster distribution of updates, and for a more consistent update experience.\n\nThis release of Red Hat JBoss Core Services Apache HTTP Server 2.4.51 Service Pack 1 serves as a replacement for Red Hat JBoss Core Services Apache HTTP Server 2.4.51, and includes bug fixes and enhancements, which are documented in the Release Notes document linked to in the References.\n\nSecurity Fix(es):\n\n* httpd: mod_sed: Read/write beyond bounds (CVE-2022-23943)\n\n* expat: a use-after-free in the doContent function in xmlparse.c (CVE-2022-40674)\n\n* openssl: c_rehash script allows command injection (CVE-2022-1292)\n\n* openssl: the c_rehash script allows command injection (CVE-2022-2068)\n\n* httpd: core: Possible buffer overflow with very large or unlimited LimitXMLRequestBody (CVE-2022-22721)\n\n* httpd: mod_proxy_ajp: Possible request smuggling (CVE-2022-26377)\n\n* libxml2: integer overflows in xmlBuf and xmlBuffer lead to out-of-bounds write (CVE-2022-29824)\n\n* httpd: mod_sed: DoS vulnerability (CVE-2022-30522)\n\n* httpd: mod_proxy: X-Forwarded-For dropped by hop-by-hop mechanism (CVE-2022-31813)\n\n* curl: HTTP compression denial of service (CVE-2022-32206)\n\n* curl: Unpreserved file permissions (CVE-2022-32207)\n\n* curl: FTP-KRB bad message verification (CVE-2022-32208)\n\n* curl: POST following PUT confusion (CVE-2022-32221)\n\n* zlib: heap-based buffer over-read and overflow in inflate() in inflate.c via a large gzip header extra field (CVE-2022-37434)\n\n* libxml2: integer overflows with XML_PARSE_HUGE (CVE-2022-40303)\n\n* libxml2: dict corruption caused by entity reference cycles (CVE-2022-40304)\n\n* curl: HTTP proxy double-free (CVE-2022-42915)\n\n* curl: HSTS bypass via IDN (CVE-2022-42916)\n\n* curl: CERTINFO never-ending busy-loop (CVE-2022-27781)\n\n* httpd: mod_isapi: out-of-bounds read (CVE-2022-28330)\n\n* httpd: Out-of-bounds read via ap_rwrite() (CVE-2022-28614)\n\n* httpd: Out-of-bounds read in ap_strcmp_match() (CVE-2022-28615)\n\n* curl: control code in cookie denial of service (CVE-2022-35252)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2022:8841", "url": "https://access.redhat.com/errata/RHSA-2022:8841" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "2064319", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2064319" }, { "category": "external", "summary": "2064320", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2064320" }, { "category": "external", "summary": "2081494", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2081494" }, { "category": "external", "summary": "2082158", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2082158" }, { "category": "external", "summary": "2082204", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2082204" }, { "category": "external", "summary": "2094997", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2094997" }, { "category": "external", "summary": "2095000", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2095000" }, { "category": "external", "summary": "2095002", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2095002" }, { "category": "external", "summary": "2095006", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2095006" }, { "category": "external", "summary": "2095015", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2095015" }, { "category": "external", "summary": "2095020", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2095020" }, { "category": "external", "summary": "2097310", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2097310" }, { "category": "external", "summary": "2099300", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2099300" }, { "category": "external", "summary": "2099305", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2099305" }, { "category": "external", "summary": "2099306", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2099306" }, { "category": "external", "summary": "2116639", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2116639" }, { "category": "external", "summary": "2120718", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2120718" }, { "category": "external", "summary": "2130769", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2130769" }, { "category": "external", "summary": "2135411", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2135411" }, { "category": "external", "summary": "2135413", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2135413" }, { "category": "external", "summary": "2135416", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2135416" }, { "category": "external", "summary": "2136266", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2136266" }, { "category": "external", "summary": "2136288", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2136288" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2022/rhsa-2022_8841.json" } ], "title": "Red Hat Security Advisory: Red Hat JBoss Core Services Apache HTTP Server 2.4.51 SP1 security update", "tracking": { "current_release_date": "2024-12-15T21:10:45+00:00", "generator": { "date": "2024-12-15T21:10:45+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.3" } }, "id": "RHSA-2022:8841", "initial_release_date": "2022-12-08T13:21:17+00:00", "revision_history": [ { "date": "2022-12-08T13:21:17+00:00", "number": "1", "summary": "Initial version" }, { "date": "2023-01-18T11:23:11+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-12-15T21:10:45+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat JBoss Core Services 1", "product": { "name": "Red Hat JBoss Core Services 1", "product_id": "Red Hat JBoss Core Services 1", "product_identification_helper": { "cpe": "cpe:/a:redhat:jboss_core_services:1" } } } ], "category": "product_family", "name": "Red Hat JBoss Core Services" } ], "category": "vendor", "name": "Red Hat" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "Elison Niven" ], "organization": "Sophos", "summary": "Acknowledged by upstream." } ], "cve": "CVE-2022-1292", "cwe": { "id": "CWE-77", "name": "Improper Neutralization of Special Elements used in a Command (\u0027Command Injection\u0027)" }, "discovery_date": "2022-05-03T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2081494" } ], "notes": [ { "category": "description", "text": "A flaw was found in OpenSSL. The `c_rehash` script does not properly sanitize shell meta-characters to prevent command injection. Some operating systems distribute this script in a manner where it is automatically executed. This flaw allows an attacker to execute arbitrary commands with the privileges of the script on these operating systems.", "title": "Vulnerability description" }, { "category": "summary", "text": "openssl: c_rehash script allows command injection", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Enterprise Linux uses a system-wide store of trusted certificates bundled in a single file and updated via `update-ca-trust`. The `c_rehash` script is not included in the default installation on any supported RHEL version, and is never executed automatically. For these reasons, this flaw has been rated as having a security impact of Moderate.\n\nRed Hat Enterprise Linux 7 provides a vulnerable version of the `c_rehash` script in the `openssl-perl` package, available only through the unsupported Optional repository. As the Optional repository is not supported and Red Hat Enterprise Linux 7 is in Maintenance Support 2 Phase, this issue is not planned to be addressed there.\n\nRed Hat Satellite ships an affected version of the `c_rehash` script embedded in `puppet-agent` package, however, the product is not vulnerable since it does not execute scripts with untrusted data. Moreover, the scriplet is owned by root user and is supposed to be accessed only by administrators.\n\nRed Hat updates the OpenSSL compatibility packages (compat-openssl) to only address Important or Critical security issues with backported security patches.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Core Services 1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-1292" }, { "category": "external", "summary": "RHBZ#2081494", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2081494" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-1292", "url": "https://www.cve.org/CVERecord?id=CVE-2022-1292" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-1292", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-1292" }, { "category": "external", "summary": "https://www.openssl.org/news/secadv/20220503.txt", "url": "https://www.openssl.org/news/secadv/20220503.txt" } ], "release_date": "2022-05-03T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-12-08T13:21:17+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "Red Hat JBoss Core Services 1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:8841" }, { "category": "workaround", "details": "As mentioned in the upstream security advisory, use of the c_rehash script is considered obsolete and should be replaced by the OpenSSL rehash command line tool.", "product_ids": [ "Red Hat JBoss Core Services 1" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "Red Hat JBoss Core Services 1" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "openssl: c_rehash script allows command injection" }, { "acknowledgments": [ { "names": [ "Chancen" ], "organization": "Qingteng 73lab", "summary": "Acknowledged by upstream." } ], "cve": "CVE-2022-2068", "cwe": { "id": "CWE-77", "name": "Improper Neutralization of Special Elements used in a Command (\u0027Command Injection\u0027)" }, "discovery_date": "2022-06-15T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2097310" } ], "notes": [ { "category": "description", "text": "A flaw was found in OpenSSL. The issue in CVE-2022-1292 did not find other places in the `c_rehash` script where it possibly passed the file names of certificates being hashed to a command executed through the shell. Some operating systems distribute this script in a manner where it is automatically executed. On these operating systems, this flaw allows an attacker to execute arbitrary commands with the privileges of the script.", "title": "Vulnerability description" }, { "category": "summary", "text": "openssl: the c_rehash script allows command injection", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Enterprise Linux uses a system-wide store of trusted certificates bundled in a single file and updated via `update-ca-trust`. The `c_rehash` script is not included in the default installation on any supported RHEL version and is never executed automatically. For these reasons, this flaw has been rated as having a security impact of Moderate.\n\nRed Hat Enterprise Linux 7 provides a vulnerable version of the `c_rehash` script in the `openssl-perl` package, available only through the unsupported Optional repository. As the Optional repository is not supported and Red Hat Enterprise Linux 7 is in Maintenance Support 2 Phase, this issue is not planned to be addressed there.\n\nRed Hat Satellite ships an affected version of the `c_rehash` script embedded in `puppet-agent` package, however, the product is not vulnerable since it does not execute scripts with untrusted data. Moreover, the scriplet is owned by root user and is supposed to be accessed only by administrators.\n\nRed Hat updates the OpenSSL compatibility packages (compat-openssl) to only address Important or Critical security issues with backported security patches.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Core Services 1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-2068" }, { "category": "external", "summary": "RHBZ#2097310", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2097310" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-2068", "url": "https://www.cve.org/CVERecord?id=CVE-2022-2068" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-2068", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-2068" }, { "category": "external", "summary": "https://www.openssl.org/news/secadv/20220621.txt", "url": "https://www.openssl.org/news/secadv/20220621.txt" } ], "release_date": "2022-06-21T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-12-08T13:21:17+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "Red Hat JBoss Core Services 1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:8841" }, { "category": "workaround", "details": "As mentioned in the upstream security advisory, use of the c_rehash script is considered obsolete and should be replaced by the OpenSSL rehash command-line tool.", "product_ids": [ "Red Hat JBoss Core Services 1" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "Red Hat JBoss Core Services 1" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "openssl: the c_rehash script allows command injection" }, { "cve": "CVE-2022-22721", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "discovery_date": "2022-03-15T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2064320" } ], "notes": [ { "category": "description", "text": "A flaw was found in httpd, where it incorrectly limits the value of the LimitXMLRequestBody option. This issue can lead to an integer overflow and later causes an out-of-bounds write.", "title": "Vulnerability description" }, { "category": "summary", "text": "httpd: core: Possible buffer overflow with very large or unlimited LimitXMLRequestBody", "title": "Vulnerability summary" }, { "category": "other", "text": "The default configuration of the LimitXMLRequestBody option on RHEL is 1MB and therefore is not vulnerable to this flaw. Also, this issue is known to only affect 32bit httpd builds.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Core Services 1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-22721" }, { "category": "external", "summary": "RHBZ#2064320", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2064320" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-22721", "url": "https://www.cve.org/CVERecord?id=CVE-2022-22721" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-22721", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-22721" }, { "category": "external", "summary": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2022-22721", "url": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2022-22721" } ], "release_date": "2022-03-14T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-12-08T13:21:17+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "Red Hat JBoss Core Services 1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:8841" }, { "category": "workaround", "details": "Set the LimitXMLRequestBody option to a value smaller than 350MB. Setting it to 0 is not recommended as it will use a hard limit (depending on 32bit or 64bit systems) which may result in an overall system out-of-memory. The default configuration is not vulnerable to this flaw, see the statement above.", "product_ids": [ "Red Hat JBoss Core Services 1" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.4, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:H", "version": "3.1" }, "products": [ "Red Hat JBoss Core Services 1" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "httpd: core: Possible buffer overflow with very large or unlimited LimitXMLRequestBody" }, { "cve": "CVE-2022-23943", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "discovery_date": "2022-03-15T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2064319" } ], "notes": [ { "category": "description", "text": "An out-of-bounds read/write vulnerability was found in the mod_sed module of httpd. This flaw allows an attacker to overwrite the memory of an httpd instance that is using mod_sed with data provided by the attacker.", "title": "Vulnerability description" }, { "category": "summary", "text": "httpd: mod_sed: Read/write beyond bounds", "title": "Vulnerability summary" }, { "category": "other", "text": "The `mod_sed` module is disabled by default on Red Hat Enterprise Linux 7 and 8. For this reason, the flaw has been rated as having a security impact of Moderate. The httpd package as shipped with Red Hat Enterprise Linux 6 is not affected by this flaw because the `mod_sed` module is available only in httpd 2.3 and later.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Core Services 1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-23943" }, { "category": "external", "summary": "RHBZ#2064319", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2064319" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-23943", "url": "https://www.cve.org/CVERecord?id=CVE-2022-23943" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-23943", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-23943" }, { "category": "external", "summary": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2022-23943", "url": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2022-23943" } ], "release_date": "2022-03-14T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-12-08T13:21:17+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "Red Hat JBoss Core Services 1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:8841" }, { "category": "workaround", "details": "Disabling mod_sed and restarting httpd will mitigate this flaw. See https://access.redhat.com/articles/10649 for more information.", "product_ids": [ "Red Hat JBoss Core Services 1" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "Red Hat JBoss Core Services 1" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "httpd: mod_sed: Read/write beyond bounds" }, { "cve": "CVE-2022-26377", "cwe": { "id": "CWE-444", "name": "Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027)" }, "discovery_date": "2022-06-08T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2094997" } ], "notes": [ { "category": "description", "text": "An HTTP request smuggling vulnerability was found in the mod_proxy_ajp module of httpd. This flaw allows an attacker to smuggle requests to the AJP server, where it forwards requests.", "title": "Vulnerability description" }, { "category": "summary", "text": "httpd: mod_proxy_ajp: Possible request smuggling", "title": "Vulnerability summary" }, { "category": "other", "text": "The httpd mod_proxy_ajp module is enabled by default on Red Hat Enterprise Linux 8, 9, and in RHSCL. However, there are no directives forwarding requests using the AJP protocol.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Core Services 1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-26377" }, { "category": "external", "summary": "RHBZ#2094997", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2094997" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-26377", "url": "https://www.cve.org/CVERecord?id=CVE-2022-26377" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-26377", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-26377" }, { "category": "external", "summary": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2022-26377", "url": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2022-26377" } ], "release_date": "2022-06-08T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-12-08T13:21:17+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "Red Hat JBoss Core Services 1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:8841" }, { "category": "workaround", "details": "Disabling mod_proxy_ajp and restarting httpd will mitigate this flaw.", "product_ids": [ "Red Hat JBoss Core Services 1" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:L", "version": "3.1" }, "products": [ "Red Hat JBoss Core Services 1" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "httpd: mod_proxy_ajp: Possible request smuggling" }, { "cve": "CVE-2022-27781", "cwe": { "id": "CWE-835", "name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)" }, "discovery_date": "2022-05-05T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2082204" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in curl. This issue occurs due to an erroneous function. A malicious server could make curl within Network Security Services (NSS) get stuck in a never-ending busy loop when trying to retrieve that information. This flaw allows an Infinite Loop, affecting system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "curl: CERTINFO never-ending busy-loop", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Enterprise Linux 8 and 9 are not affected because our build of curl does not use NSS for TLS.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Core Services 1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-27781" }, { "category": "external", "summary": "RHBZ#2082204", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2082204" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-27781", "url": "https://www.cve.org/CVERecord?id=CVE-2022-27781" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-27781", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-27781" }, { "category": "external", "summary": "https://curl.se/docs/CVE-2022-27781.html", "url": "https://curl.se/docs/CVE-2022-27781.html" } ], "release_date": "2022-05-11T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-12-08T13:21:17+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "Red Hat JBoss Core Services 1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:8841" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "Red Hat JBoss Core Services 1" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "curl: CERTINFO never-ending busy-loop" }, { "cve": "CVE-2022-28330", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "discovery_date": "2022-06-08T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2095000" } ], "notes": [ { "category": "description", "text": "An out-of-bounds read vulnerability was found in the mod_isapi module of httpd. The issue occurs when httpd is configured to process requests with the mod_isapi module.", "title": "Vulnerability description" }, { "category": "summary", "text": "httpd: mod_isapi: out-of-bounds read", "title": "Vulnerability summary" }, { "category": "other", "text": "Httpd, as shipped with Red Hat Enterprise Linux 6, 7, 8, 9, and RHSCL, is not affected by this flaw because it does not ship the mod_isapi module. The mod_isapi module is shipped by Windows systems only.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Core Services 1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-28330" }, { "category": "external", "summary": "RHBZ#2095000", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2095000" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-28330", "url": "https://www.cve.org/CVERecord?id=CVE-2022-28330" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-28330", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-28330" }, { "category": "external", "summary": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2022-28330", "url": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2022-28330" } ], "release_date": "2022-06-08T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-12-08T13:21:17+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "Red Hat JBoss Core Services 1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:8841" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "Red Hat JBoss Core Services 1" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "httpd: mod_isapi: out-of-bounds read" }, { "cve": "CVE-2022-28614", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2022-06-08T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2095002" } ], "notes": [ { "category": "description", "text": "An out-of-bounds read vulnerability was found in httpd. A very large input to the ap_rputs and ap_rwrite functions can lead to an integer overflow and result in an out-of-bounds read.", "title": "Vulnerability description" }, { "category": "summary", "text": "httpd: Out-of-bounds read via ap_rwrite()", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Core Services 1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-28614" }, { "category": "external", "summary": "RHBZ#2095002", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2095002" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-28614", "url": "https://www.cve.org/CVERecord?id=CVE-2022-28614" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-28614", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-28614" }, { "category": "external", "summary": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2022-28614", "url": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2022-28614" } ], "release_date": "2022-06-08T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-12-08T13:21:17+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "Red Hat JBoss Core Services 1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:8841" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "Red Hat JBoss Core Services 1" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "httpd: Out-of-bounds read via ap_rwrite()" }, { "cve": "CVE-2022-28615", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "discovery_date": "2022-06-08T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2095006" } ], "notes": [ { "category": "description", "text": "An out-of-bounds read vulnerability was found in httpd. A very large input to the ap_strcmp_match function can lead to an integer overflow and result in an out-of-bounds read.", "title": "Vulnerability description" }, { "category": "summary", "text": "httpd: Out-of-bounds read in ap_strcmp_match()", "title": "Vulnerability summary" }, { "category": "other", "text": "According to upstream, no code distributed with the httpd server can exploit this flaw, however, third-party modules or Lua scripts that use the ap_strcmp_match function could potentially be affected.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Core Services 1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-28615" }, { "category": "external", "summary": "RHBZ#2095006", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2095006" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-28615", "url": "https://www.cve.org/CVERecord?id=CVE-2022-28615" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-28615", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-28615" }, { "category": "external", "summary": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2022-28615", "url": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2022-28615" } ], "release_date": "2022-06-08T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-12-08T13:21:17+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "Red Hat JBoss Core Services 1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:8841" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.4, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H", "version": "3.1" }, "products": [ "Red Hat JBoss Core Services 1" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "httpd: Out-of-bounds read in ap_strcmp_match()" }, { "cve": "CVE-2022-29824", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "discovery_date": "2022-05-05T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2082158" } ], "notes": [ { "category": "description", "text": "A flaw was found in the libxml2 library in functions used to manipulate the xmlBuf and the xmlBuffer types. A substantial input causes values to calculate buffer sizes to overflow, resulting in an out-of-bounds write.", "title": "Vulnerability description" }, { "category": "summary", "text": "libxml2: integer overflows in xmlBuf and xmlBuffer lead to out-of-bounds write", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Core Services 1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-29824" }, { "category": "external", "summary": "RHBZ#2082158", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2082158" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-29824", "url": "https://www.cve.org/CVERecord?id=CVE-2022-29824" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-29824", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-29824" } ], "release_date": "2022-05-03T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-12-08T13:21:17+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "Red Hat JBoss Core Services 1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:8841" }, { "category": "workaround", "details": "Avoid passing large inputs to the libxml2 library.", "product_ids": [ "Red Hat JBoss Core Services 1" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.4, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:H", "version": "3.1" }, "products": [ "Red Hat JBoss Core Services 1" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "libxml2: integer overflows in xmlBuf and xmlBuffer lead to out-of-bounds write" }, { "cve": "CVE-2022-30522", "cwe": { "id": "CWE-789", "name": "Memory Allocation with Excessive Size Value" }, "discovery_date": "2022-06-08T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2095015" } ], "notes": [ { "category": "description", "text": "A flaw was found in the mod_sed module of httpd. A very large input to the mod_sed module can result in a denial of service due to excessively large memory allocations.", "title": "Vulnerability description" }, { "category": "summary", "text": "httpd: mod_sed: DoS vulnerability", "title": "Vulnerability summary" }, { "category": "other", "text": "The mod_sed module is disabled by default on Red Hat Enterprise Linux 7 and 8. The httpd package as shipped with Red Hat Enterprise Linux 6 is not affected by this flaw because the mod_sed module is not available.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Core Services 1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-30522" }, { "category": "external", "summary": "RHBZ#2095015", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2095015" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-30522", "url": "https://www.cve.org/CVERecord?id=CVE-2022-30522" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-30522", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-30522" }, { "category": "external", "summary": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2022-30522", "url": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2022-30522" } ], "release_date": "2022-06-08T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-12-08T13:21:17+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "Red Hat JBoss Core Services 1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:8841" }, { "category": "workaround", "details": "Disabling mod_sed and restating httpd will mitigate this flaw.", "product_ids": [ "Red Hat JBoss Core Services 1" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "Red Hat JBoss Core Services 1" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "httpd: mod_sed: DoS vulnerability" }, { "cve": "CVE-2022-31813", "cwe": { "id": "CWE-348", "name": "Use of Less Trusted Source" }, "discovery_date": "2022-06-08T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2095020" } ], "notes": [ { "category": "description", "text": "A flaw was found in the mod_proxy module of httpd. The server may remove the X-Forwarded-* headers from a request based on the client-side Connection header hop-by-hop mechanism.", "title": "Vulnerability description" }, { "category": "summary", "text": "httpd: mod_proxy: X-Forwarded-For dropped by hop-by-hop mechanism", "title": "Vulnerability summary" }, { "category": "other", "text": "This flaw has been rated as having a security impact of Moderate, and is not currently planned to be addressed in future updates of Red Hat Enterprise Linux 7. Red Hat Enterprise Linux 7 is now in Maintenance Support 2 Phase of the support and maintenance life cycle. For additional information, refer to the Red Hat Enterprise Linux Life Cycle: https://access.redhat.com/support/policy/updates/errata.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Core Services 1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-31813" }, { "category": "external", "summary": "RHBZ#2095020", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2095020" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-31813", "url": "https://www.cve.org/CVERecord?id=CVE-2022-31813" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-31813", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-31813" }, { "category": "external", "summary": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2022-31813", "url": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2022-31813" } ], "release_date": "2022-06-08T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-12-08T13:21:17+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "Red Hat JBoss Core Services 1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:8841" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "Red Hat JBoss Core Services 1" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 7.3, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" }, "products": [ "Red Hat JBoss Core Services 1" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "httpd: mod_proxy: X-Forwarded-For dropped by hop-by-hop mechanism" }, { "cve": "CVE-2022-32206", "cwe": { "id": "CWE-770", "name": "Allocation of Resources Without Limits or Throttling" }, "discovery_date": "2022-06-20T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2099300" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in curl. This issue occurs because the number of acceptable \"links\" in the \"decompression chain\" was unbounded, allowing a malicious server to insert a virtually unlimited number of compression steps. This flaw leads to a denial of service, either by mistake or by a malicious actor.", "title": "Vulnerability description" }, { "category": "summary", "text": "curl: HTTP compression denial of service", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Core Services 1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-32206" }, { "category": "external", "summary": "RHBZ#2099300", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2099300" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-32206", "url": "https://www.cve.org/CVERecord?id=CVE-2022-32206" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-32206", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-32206" }, { "category": "external", "summary": "https://curl.se/docs/CVE-2022-32206.html", "url": "https://curl.se/docs/CVE-2022-32206.html" } ], "release_date": "2022-06-27T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-12-08T13:21:17+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "Red Hat JBoss Core Services 1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:8841" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "Red Hat JBoss Core Services 1" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "curl: HTTP compression denial of service" }, { "cve": "CVE-2022-32207", "cwe": { "id": "CWE-281", "name": "Improper Preservation of Permissions" }, "discovery_date": "2022-06-20T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2099305" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in curl. This issue occurs because when curl saves cookies, alt-svc, and HSTS data to local files, it makes the operation atomic by finalizing the process with a rename from a temporary name to the final target file name. This flaw leads to unpreserved file permissions, either by mistake or by a malicious actor.", "title": "Vulnerability description" }, { "category": "summary", "text": "curl: Unpreserved file permissions", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Core Services 1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-32207" }, { "category": "external", "summary": "RHBZ#2099305", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2099305" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-32207", "url": "https://www.cve.org/CVERecord?id=CVE-2022-32207" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-32207", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-32207" }, { "category": "external", "summary": "https://curl.se/docs/CVE-2022-32207.html", "url": "https://curl.se/docs/CVE-2022-32207.html" } ], "release_date": "2022-06-27T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-12-08T13:21:17+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "Red Hat JBoss Core Services 1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:8841" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "Red Hat JBoss Core Services 1" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "curl: Unpreserved file permissions" }, { "cve": "CVE-2022-32208", "cwe": { "id": "CWE-924", "name": "Improper Enforcement of Message Integrity During Transmission in a Communication Channel" }, "discovery_date": "2022-06-20T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2099306" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in curl. This issue occurs because it mishandles message verification failures when curl does FTP transfers secured by krb5. This flaw makes it possible for a Man-in-the-middle attack to go unnoticed and allows data injection into the client.", "title": "Vulnerability description" }, { "category": "summary", "text": "curl: FTP-KRB bad message verification", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Core Services 1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-32208" }, { "category": "external", "summary": "RHBZ#2099306", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2099306" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-32208", "url": "https://www.cve.org/CVERecord?id=CVE-2022-32208" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-32208", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-32208" }, { "category": "external", "summary": "https://curl.se/docs/CVE-2022-32208.html", "url": "https://curl.se/docs/CVE-2022-32208.html" } ], "release_date": "2022-06-27T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-12-08T13:21:17+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "Red Hat JBoss Core Services 1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:8841" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "Red Hat JBoss Core Services 1" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "curl: FTP-KRB bad message verification" }, { "cve": "CVE-2022-32221", "cwe": { "id": "CWE-440", "name": "Expected Behavior Violation" }, "discovery_date": "2022-10-17T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2135411" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in curl. The issue occurs when doing HTTP(S) transfers, where curl might erroneously use the read callback (`CURLOPT_READFUNCTION`) to ask for data to send, even when the `CURLOPT_POSTFIELDS` option has been set if it previously used the same handle to issue a `PUT` request which used that callback. This flaw may surprise the application and cause it to misbehave and either send off the wrong data or use memory after free or similar in the subsequent `POST` request.", "title": "Vulnerability description" }, { "category": "summary", "text": "curl: POST following PUT confusion", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Core Services 1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-32221" }, { "category": "external", "summary": "RHBZ#2135411", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2135411" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-32221", "url": "https://www.cve.org/CVERecord?id=CVE-2022-32221" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-32221", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-32221" }, { "category": "external", "summary": "https://curl.se/docs/CVE-2022-32221.html", "url": "https://curl.se/docs/CVE-2022-32221.html" } ], "release_date": "2022-10-26T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-12-08T13:21:17+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "Red Hat JBoss Core Services 1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:8841" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N", "version": "3.1" }, "products": [ "Red Hat JBoss Core Services 1" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "curl: POST following PUT confusion" }, { "cve": "CVE-2022-35252", "cwe": { "id": "CWE-1286", "name": "Improper Validation of Syntactic Correctness of Input" }, "discovery_date": "2022-08-23T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2120718" } ], "notes": [ { "category": "description", "text": "A vulnerability found in curl. This security flaw happens when curl is used to retrieve and parse cookies from an HTTP(S) server, where it accepts cookies using control codes (byte values below 32), and also when cookies that contain such control codes are later sent back to an HTTP(S) server, possibly causing the server to return a 400 response. This issue effectively allows a \"sister site\" to deny service to siblings and cause a denial of service attack.", "title": "Vulnerability description" }, { "category": "summary", "text": "curl: Incorrect handling of control code characters in cookies", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Core Services 1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-35252" }, { "category": "external", "summary": "RHBZ#2120718", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2120718" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-35252", "url": "https://www.cve.org/CVERecord?id=CVE-2022-35252" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-35252", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-35252" } ], "release_date": "2022-08-31T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-12-08T13:21:17+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "Red Hat JBoss Core Services 1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:8841" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 3.1, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "Red Hat JBoss Core Services 1" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "curl: Incorrect handling of control code characters in cookies" }, { "cve": "CVE-2022-37434", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "discovery_date": "2022-08-09T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2116639" } ], "notes": [ { "category": "description", "text": "A security vulnerability was found in zlib. The flaw triggered a heap-based buffer in inflate in the inflate.c function via a large gzip header extra field. This flaw is only applicable in the call inflateGetHeader.", "title": "Vulnerability description" }, { "category": "summary", "text": "zlib: heap-based buffer over-read and overflow in inflate() in inflate.c via a large gzip header extra field", "title": "Vulnerability summary" }, { "category": "other", "text": "While some Red Hat Products bundle the affected zlib source code, in many cases it is not possible for an attacker to trigger the vulnerable function.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Core Services 1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-37434" }, { "category": "external", "summary": "RHBZ#2116639", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2116639" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-37434", "url": "https://www.cve.org/CVERecord?id=CVE-2022-37434" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-37434", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-37434" } ], "release_date": "2022-08-05T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-12-08T13:21:17+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "Red Hat JBoss Core Services 1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:8841" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.0, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H", "version": "3.1" }, "products": [ "Red Hat JBoss Core Services 1" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "zlib: heap-based buffer over-read and overflow in inflate() in inflate.c via a large gzip header extra field" }, { "cve": "CVE-2022-40303", "cwe": { "id": "CWE-190", "name": "Integer Overflow or Wraparound" }, "discovery_date": "2022-10-14T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2136266" } ], "notes": [ { "category": "description", "text": "A flaw was found in libxml2. Parsing a XML document with the XML_PARSE_HUGE option enabled can result in an integer overflow because safety checks were missing in some functions. Also, the xmlParseEntityValue function didn\u0027t have any length limitation.", "title": "Vulnerability description" }, { "category": "summary", "text": "libxml2: integer overflows with XML_PARSE_HUGE", "title": "Vulnerability summary" }, { "category": "other", "text": "This flaw is only triggered when parsing a multi-gigabyte XML document with the XML_PARSE_HUGE option enabled, and the most likely impact of this flaw is a Denial of Service in the application linked to the library. To reflect these conditions, Red Hat Product Security has rated this flaw as having a moderate security impact.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Core Services 1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-40303" }, { "category": "external", "summary": "RHBZ#2136266", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2136266" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-40303", "url": "https://www.cve.org/CVERecord?id=CVE-2022-40303" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-40303", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-40303" } ], "release_date": "2022-10-14T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-12-08T13:21:17+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "Red Hat JBoss Core Services 1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:8841" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "Red Hat JBoss Core Services 1" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "libxml2: integer overflows with XML_PARSE_HUGE" }, { "cve": "CVE-2022-40304", "cwe": { "id": "CWE-415", "name": "Double Free" }, "discovery_date": "2022-10-14T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2136288" } ], "notes": [ { "category": "description", "text": "A flaw was found in libxml2. When a reference cycle is detected in the XML entity cleanup function the XML entity data can be stored in a dictionary. In this case, the dictionary becomes corrupted resulting in logic errors, including memory errors like double free.", "title": "Vulnerability description" }, { "category": "summary", "text": "libxml2: dict corruption caused by entity reference cycles", "title": "Vulnerability summary" }, { "category": "other", "text": "The most likely impact of this flaw is a Denial of Service in the application linked to the library. To reflect this, Red Hat Product Security has rated this flaw as having a moderate security impact.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Core Services 1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-40304" }, { "category": "external", "summary": "RHBZ#2136288", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2136288" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-40304", "url": "https://www.cve.org/CVERecord?id=CVE-2022-40304" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-40304", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-40304" } ], "release_date": "2022-10-14T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-12-08T13:21:17+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "Red Hat JBoss Core Services 1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:8841" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "Red Hat JBoss Core Services 1" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "libxml2: dict corruption caused by entity reference cycles" }, { "cve": "CVE-2022-40674", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2022-09-29T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2130769" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in expat. With this flaw, it is possible to create a situation in which parsing is suspended while substituting in an internal entity so that XML_ResumeParser directly uses the internalEntityProcessor as its processor. If the subsequent parse includes some unclosed tags, this will return without calling storeRawNames to ensure that the raw versions of the tag names are stored in memory other than the parse buffer itself. Issues occur if the parse buffer is changed or reallocated (for example, if processing a file line by line), problems occur. Using this vulnerability in the doContent function allows an attacker to triage a denial of service or potentially arbitrary code execution.", "title": "Vulnerability description" }, { "category": "summary", "text": "expat: a use-after-free in the doContent function in xmlparse.c", "title": "Vulnerability summary" }, { "category": "other", "text": "This flaw is rated as important because this flaw can easily compromise the confidentiality, integrity, or availability of resources but a successful attack can not execute arbitrary code, or allow remote users to cause a denial of service because attack complexity is high and depends on conditions beyond the attacker\u0027s control.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Core Services 1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-40674" }, { "category": "external", "summary": "RHBZ#2130769", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2130769" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-40674", "url": "https://www.cve.org/CVERecord?id=CVE-2022-40674" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-40674", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-40674" }, { "category": "external", "summary": "https://blog.hartwork.org/posts/expat-2-4-9-released/", "url": "https://blog.hartwork.org/posts/expat-2-4-9-released/" }, { "category": "external", "summary": "https://github.com/advisories/GHSA-2vq2-xc55-3j5m", "url": "https://github.com/advisories/GHSA-2vq2-xc55-3j5m" } ], "release_date": "2022-09-14T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-12-08T13:21:17+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "Red Hat JBoss Core Services 1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:8841" }, { "category": "workaround", "details": "There is no known mitigation other than restricting applications using the expat library from processing XML content. Please update the affected packages as soon as possible.", "product_ids": [ "Red Hat JBoss Core Services 1" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "Red Hat JBoss Core Services 1" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "expat: a use-after-free in the doContent function in xmlparse.c" }, { "cve": "CVE-2022-42915", "cwe": { "id": "CWE-415", "name": "Double Free" }, "discovery_date": "2022-10-17T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2135413" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in curl. The issue occurs if curl is told to use an HTTP proxy for a transfer with a non-HTTP(S) URL. It sets up the connection to the remote server by issuing a `CONNECT` request to the proxy and then tunnels the rest of the protocol through. An HTTP proxy might refuse this request (HTTP proxies often only allow outgoing connections to specific port numbers, like 443 for HTTPS) and instead return a non-200 response code to the client. Due to flaws in the error/cleanup handling, this could trigger a double-free issue in curl if using one of the following schemes in the URL for the transfer: `dict,` `gopher,` `gophers,` `ldap`, `ldaps`, `rtmp`, `rtmps`, `telnet.`", "title": "Vulnerability description" }, { "category": "summary", "text": "curl: HTTP proxy double-free", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Core Services 1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-42915" }, { "category": "external", "summary": "RHBZ#2135413", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2135413" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-42915", "url": "https://www.cve.org/CVERecord?id=CVE-2022-42915" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-42915", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-42915" }, { "category": "external", "summary": "https://curl.se/docs/CVE-2022-42915.html", "url": "https://curl.se/docs/CVE-2022-42915.html" } ], "release_date": "2022-10-26T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-12-08T13:21:17+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "Red Hat JBoss Core Services 1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:8841" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "Red Hat JBoss Core Services 1" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "curl: HTTP proxy double-free" }, { "cve": "CVE-2022-42916", "cwe": { "id": "CWE-319", "name": "Cleartext Transmission of Sensitive Information" }, "discovery_date": "2022-10-17T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2135416" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in curl. The issue occurs because curl\u0027s HSTS check can be bypassed to trick it to keep using HTTP. Using its HSTS support, it can instruct curl to use HTTPS directly instead of using an insecure clear-text HTTP step even when HTTP is provided in the URL. This mechanism can be bypassed if the hostname in the given URL uses IDN characters that get replaced with ASCII counterparts as part of the IDN conversion. Like using the character UTF-8 U+3002 (IDEOGRAPHIC FULL STOP) instead of the common ASCII full stop (U+002E) `.`.", "title": "Vulnerability description" }, { "category": "summary", "text": "curl: HSTS bypass via IDN", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Core Services 1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-42916" }, { "category": "external", "summary": "RHBZ#2135416", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2135416" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-42916", "url": "https://www.cve.org/CVERecord?id=CVE-2022-42916" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-42916", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-42916" }, { "category": "external", "summary": "https://curl.se/docs/CVE-2022-42916.html", "url": "https://curl.se/docs/CVE-2022-42916.html" } ], "release_date": "2022-10-26T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-12-08T13:21:17+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "Red Hat JBoss Core Services 1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:8841" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "Red Hat JBoss Core Services 1" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "curl: HSTS bypass via IDN" } ] }
rhsa-2022_8067
Vulnerability from csaf_redhat
Published
2022-11-15 09:58
Modified
2024-11-15 15:00
Summary
Red Hat Security Advisory: httpd security, bug fix, and enhancement update
Notes
Topic
An update for httpd is now available for Red Hat Enterprise Linux 9.
Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
The httpd packages provide the Apache HTTP Server, a powerful, efficient, and extensible web server.
The following packages have been upgraded to a later upstream version: httpd (2.4.53). (BZ#2079939)
Security Fix(es):
* httpd: mod_sed: Read/write beyond bounds (CVE-2022-23943)
* httpd: mod_lua: Use of uninitialized value of in r:parsebody (CVE-2022-22719)
* httpd: core: Possible buffer overflow with very large or unlimited LimitXMLRequestBody (CVE-2022-22721)
* httpd: mod_proxy_ajp: Possible request smuggling (CVE-2022-26377)
* httpd: mod_lua: DoS in r:parsebody (CVE-2022-29404)
* httpd: mod_sed: DoS vulnerability (CVE-2022-30522)
* httpd: mod_proxy: X-Forwarded-For dropped by hop-by-hop mechanism (CVE-2022-31813)
* httpd: Out-of-bounds read via ap_rwrite() (CVE-2022-28614)
* httpd: Out-of-bounds read in ap_strcmp_match() (CVE-2022-28615)
* httpd: mod_lua: Information disclosure with websockets (CVE-2022-30556)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Red Hat Enterprise Linux 9.1 Release Notes linked from the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for httpd is now available for Red Hat Enterprise Linux 9.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "The httpd packages provide the Apache HTTP Server, a powerful, efficient, and extensible web server.\n\nThe following packages have been upgraded to a later upstream version: httpd (2.4.53). (BZ#2079939)\n\nSecurity Fix(es):\n\n* httpd: mod_sed: Read/write beyond bounds (CVE-2022-23943)\n\n* httpd: mod_lua: Use of uninitialized value of in r:parsebody (CVE-2022-22719)\n\n* httpd: core: Possible buffer overflow with very large or unlimited LimitXMLRequestBody (CVE-2022-22721)\n\n* httpd: mod_proxy_ajp: Possible request smuggling (CVE-2022-26377)\n\n* httpd: mod_lua: DoS in r:parsebody (CVE-2022-29404)\n\n* httpd: mod_sed: DoS vulnerability (CVE-2022-30522)\n\n* httpd: mod_proxy: X-Forwarded-For dropped by hop-by-hop mechanism (CVE-2022-31813)\n\n* httpd: Out-of-bounds read via ap_rwrite() (CVE-2022-28614)\n\n* httpd: Out-of-bounds read in ap_strcmp_match() (CVE-2022-28615)\n\n* httpd: mod_lua: Information disclosure with websockets (CVE-2022-30556)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 9.1 Release Notes linked from the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2022:8067", "url": "https://access.redhat.com/errata/RHSA-2022:8067" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/9/html/9.1_release_notes/index", "url": "https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/9/html/9.1_release_notes/index" }, { "category": "external", "summary": "2064319", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2064319" }, { "category": "external", "summary": "2064320", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2064320" }, { "category": "external", "summary": "2064322", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2064322" }, { "category": "external", "summary": "2073459", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2073459" }, { "category": "external", "summary": "2075406", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2075406" }, { "category": "external", "summary": "2079939", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2079939" }, { "category": "external", "summary": "2094997", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2094997" }, { "category": "external", "summary": "2095002", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2095002" }, { "category": "external", "summary": "2095006", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2095006" }, { "category": "external", "summary": "2095012", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2095012" }, { "category": "external", "summary": "2095015", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2095015" }, { "category": "external", "summary": "2095018", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2095018" }, { "category": "external", "summary": "2095020", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2095020" }, { "category": "external", "summary": "2095838", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2095838" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2022/rhsa-2022_8067.json" } ], "title": "Red Hat Security Advisory: httpd security, bug fix, and enhancement update", "tracking": { "current_release_date": "2024-11-15T15:00:12+00:00", "generator": { "date": "2024-11-15T15:00:12+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2022:8067", "initial_release_date": "2022-11-15T09:58:32+00:00", "revision_history": [ { "date": "2022-11-15T09:58:32+00:00", "number": "1", "summary": "Initial version" }, { "date": "2022-11-15T09:58:32+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-15T15:00:12+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux AppStream (v. 9)", "product": { "name": "Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.1.0.GA", "product_identification_helper": { "cpe": "cpe:/a:redhat:enterprise_linux:9::appstream" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "httpd-0:2.4.53-7.el9.src", "product": { "name": "httpd-0:2.4.53-7.el9.src", "product_id": "httpd-0:2.4.53-7.el9.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd@2.4.53-7.el9?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "httpd-0:2.4.53-7.el9.aarch64", "product": { "name": "httpd-0:2.4.53-7.el9.aarch64", "product_id": "httpd-0:2.4.53-7.el9.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd@2.4.53-7.el9?arch=aarch64" } } }, { "category": "product_version", "name": "httpd-core-0:2.4.53-7.el9.aarch64", "product": { "name": "httpd-core-0:2.4.53-7.el9.aarch64", "product_id": "httpd-core-0:2.4.53-7.el9.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-core@2.4.53-7.el9?arch=aarch64" } } }, { "category": "product_version", "name": "httpd-devel-0:2.4.53-7.el9.aarch64", "product": { "name": "httpd-devel-0:2.4.53-7.el9.aarch64", "product_id": "httpd-devel-0:2.4.53-7.el9.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-devel@2.4.53-7.el9?arch=aarch64" } } }, { "category": "product_version", "name": "httpd-tools-0:2.4.53-7.el9.aarch64", "product": { "name": "httpd-tools-0:2.4.53-7.el9.aarch64", "product_id": "httpd-tools-0:2.4.53-7.el9.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-tools@2.4.53-7.el9?arch=aarch64" } } }, { "category": "product_version", "name": "mod_ldap-0:2.4.53-7.el9.aarch64", "product": { "name": "mod_ldap-0:2.4.53-7.el9.aarch64", "product_id": "mod_ldap-0:2.4.53-7.el9.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ldap@2.4.53-7.el9?arch=aarch64" } } }, { "category": "product_version", "name": "mod_lua-0:2.4.53-7.el9.aarch64", "product": { "name": "mod_lua-0:2.4.53-7.el9.aarch64", "product_id": "mod_lua-0:2.4.53-7.el9.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_lua@2.4.53-7.el9?arch=aarch64" } } }, { "category": "product_version", "name": "mod_proxy_html-1:2.4.53-7.el9.aarch64", "product": { "name": "mod_proxy_html-1:2.4.53-7.el9.aarch64", "product_id": "mod_proxy_html-1:2.4.53-7.el9.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_proxy_html@2.4.53-7.el9?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_session-0:2.4.53-7.el9.aarch64", "product": { "name": "mod_session-0:2.4.53-7.el9.aarch64", "product_id": "mod_session-0:2.4.53-7.el9.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_session@2.4.53-7.el9?arch=aarch64" } } }, { "category": "product_version", "name": "mod_ssl-1:2.4.53-7.el9.aarch64", "product": { "name": "mod_ssl-1:2.4.53-7.el9.aarch64", "product_id": "mod_ssl-1:2.4.53-7.el9.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ssl@2.4.53-7.el9?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "httpd-debugsource-0:2.4.53-7.el9.aarch64", "product": { "name": "httpd-debugsource-0:2.4.53-7.el9.aarch64", "product_id": "httpd-debugsource-0:2.4.53-7.el9.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-debugsource@2.4.53-7.el9?arch=aarch64" } } }, { "category": "product_version", "name": "httpd-core-debuginfo-0:2.4.53-7.el9.aarch64", "product": { "name": "httpd-core-debuginfo-0:2.4.53-7.el9.aarch64", "product_id": "httpd-core-debuginfo-0:2.4.53-7.el9.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-core-debuginfo@2.4.53-7.el9?arch=aarch64" } } }, { "category": "product_version", "name": "httpd-debuginfo-0:2.4.53-7.el9.aarch64", "product": { "name": "httpd-debuginfo-0:2.4.53-7.el9.aarch64", "product_id": "httpd-debuginfo-0:2.4.53-7.el9.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-debuginfo@2.4.53-7.el9?arch=aarch64" } } }, { "category": "product_version", "name": "httpd-tools-debuginfo-0:2.4.53-7.el9.aarch64", "product": { "name": "httpd-tools-debuginfo-0:2.4.53-7.el9.aarch64", "product_id": "httpd-tools-debuginfo-0:2.4.53-7.el9.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-tools-debuginfo@2.4.53-7.el9?arch=aarch64" } } }, { "category": "product_version", "name": "mod_ldap-debuginfo-0:2.4.53-7.el9.aarch64", "product": { "name": "mod_ldap-debuginfo-0:2.4.53-7.el9.aarch64", "product_id": "mod_ldap-debuginfo-0:2.4.53-7.el9.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ldap-debuginfo@2.4.53-7.el9?arch=aarch64" } } }, { "category": "product_version", "name": "mod_lua-debuginfo-0:2.4.53-7.el9.aarch64", "product": { "name": "mod_lua-debuginfo-0:2.4.53-7.el9.aarch64", "product_id": "mod_lua-debuginfo-0:2.4.53-7.el9.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_lua-debuginfo@2.4.53-7.el9?arch=aarch64" } } }, { "category": "product_version", "name": "mod_proxy_html-debuginfo-1:2.4.53-7.el9.aarch64", "product": { "name": "mod_proxy_html-debuginfo-1:2.4.53-7.el9.aarch64", "product_id": "mod_proxy_html-debuginfo-1:2.4.53-7.el9.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_proxy_html-debuginfo@2.4.53-7.el9?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_session-debuginfo-0:2.4.53-7.el9.aarch64", "product": { "name": "mod_session-debuginfo-0:2.4.53-7.el9.aarch64", "product_id": "mod_session-debuginfo-0:2.4.53-7.el9.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_session-debuginfo@2.4.53-7.el9?arch=aarch64" } } }, { "category": "product_version", "name": "mod_ssl-debuginfo-1:2.4.53-7.el9.aarch64", "product": { "name": "mod_ssl-debuginfo-1:2.4.53-7.el9.aarch64", "product_id": "mod_ssl-debuginfo-1:2.4.53-7.el9.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ssl-debuginfo@2.4.53-7.el9?arch=aarch64\u0026epoch=1" } } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "httpd-0:2.4.53-7.el9.ppc64le", "product": { "name": "httpd-0:2.4.53-7.el9.ppc64le", "product_id": "httpd-0:2.4.53-7.el9.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd@2.4.53-7.el9?arch=ppc64le" } } }, { "category": "product_version", "name": "httpd-core-0:2.4.53-7.el9.ppc64le", "product": { "name": "httpd-core-0:2.4.53-7.el9.ppc64le", "product_id": "httpd-core-0:2.4.53-7.el9.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-core@2.4.53-7.el9?arch=ppc64le" } } }, { "category": "product_version", "name": "httpd-devel-0:2.4.53-7.el9.ppc64le", "product": { "name": "httpd-devel-0:2.4.53-7.el9.ppc64le", "product_id": "httpd-devel-0:2.4.53-7.el9.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-devel@2.4.53-7.el9?arch=ppc64le" } } }, { "category": "product_version", "name": "httpd-tools-0:2.4.53-7.el9.ppc64le", "product": { "name": "httpd-tools-0:2.4.53-7.el9.ppc64le", "product_id": "httpd-tools-0:2.4.53-7.el9.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-tools@2.4.53-7.el9?arch=ppc64le" } } }, { "category": "product_version", "name": "mod_ldap-0:2.4.53-7.el9.ppc64le", "product": { "name": "mod_ldap-0:2.4.53-7.el9.ppc64le", "product_id": "mod_ldap-0:2.4.53-7.el9.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ldap@2.4.53-7.el9?arch=ppc64le" } } }, { "category": "product_version", "name": "mod_lua-0:2.4.53-7.el9.ppc64le", "product": { "name": "mod_lua-0:2.4.53-7.el9.ppc64le", "product_id": "mod_lua-0:2.4.53-7.el9.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_lua@2.4.53-7.el9?arch=ppc64le" } } }, { "category": "product_version", "name": "mod_proxy_html-1:2.4.53-7.el9.ppc64le", "product": { "name": "mod_proxy_html-1:2.4.53-7.el9.ppc64le", "product_id": "mod_proxy_html-1:2.4.53-7.el9.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_proxy_html@2.4.53-7.el9?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_session-0:2.4.53-7.el9.ppc64le", "product": { "name": "mod_session-0:2.4.53-7.el9.ppc64le", "product_id": "mod_session-0:2.4.53-7.el9.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_session@2.4.53-7.el9?arch=ppc64le" } } }, { "category": "product_version", "name": "mod_ssl-1:2.4.53-7.el9.ppc64le", "product": { "name": "mod_ssl-1:2.4.53-7.el9.ppc64le", "product_id": "mod_ssl-1:2.4.53-7.el9.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ssl@2.4.53-7.el9?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "httpd-debugsource-0:2.4.53-7.el9.ppc64le", "product": { "name": "httpd-debugsource-0:2.4.53-7.el9.ppc64le", "product_id": "httpd-debugsource-0:2.4.53-7.el9.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-debugsource@2.4.53-7.el9?arch=ppc64le" } } }, { "category": "product_version", "name": "httpd-core-debuginfo-0:2.4.53-7.el9.ppc64le", "product": { "name": "httpd-core-debuginfo-0:2.4.53-7.el9.ppc64le", "product_id": "httpd-core-debuginfo-0:2.4.53-7.el9.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-core-debuginfo@2.4.53-7.el9?arch=ppc64le" } } }, { "category": "product_version", "name": "httpd-debuginfo-0:2.4.53-7.el9.ppc64le", "product": { "name": "httpd-debuginfo-0:2.4.53-7.el9.ppc64le", "product_id": "httpd-debuginfo-0:2.4.53-7.el9.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-debuginfo@2.4.53-7.el9?arch=ppc64le" } } }, { "category": "product_version", "name": "httpd-tools-debuginfo-0:2.4.53-7.el9.ppc64le", "product": { "name": "httpd-tools-debuginfo-0:2.4.53-7.el9.ppc64le", "product_id": "httpd-tools-debuginfo-0:2.4.53-7.el9.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-tools-debuginfo@2.4.53-7.el9?arch=ppc64le" } } }, { "category": "product_version", "name": "mod_ldap-debuginfo-0:2.4.53-7.el9.ppc64le", "product": { "name": "mod_ldap-debuginfo-0:2.4.53-7.el9.ppc64le", "product_id": "mod_ldap-debuginfo-0:2.4.53-7.el9.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ldap-debuginfo@2.4.53-7.el9?arch=ppc64le" } } }, { "category": "product_version", "name": "mod_lua-debuginfo-0:2.4.53-7.el9.ppc64le", "product": { "name": "mod_lua-debuginfo-0:2.4.53-7.el9.ppc64le", "product_id": "mod_lua-debuginfo-0:2.4.53-7.el9.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_lua-debuginfo@2.4.53-7.el9?arch=ppc64le" } } }, { "category": "product_version", "name": "mod_proxy_html-debuginfo-1:2.4.53-7.el9.ppc64le", "product": { "name": "mod_proxy_html-debuginfo-1:2.4.53-7.el9.ppc64le", "product_id": "mod_proxy_html-debuginfo-1:2.4.53-7.el9.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_proxy_html-debuginfo@2.4.53-7.el9?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_session-debuginfo-0:2.4.53-7.el9.ppc64le", "product": { "name": "mod_session-debuginfo-0:2.4.53-7.el9.ppc64le", "product_id": "mod_session-debuginfo-0:2.4.53-7.el9.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_session-debuginfo@2.4.53-7.el9?arch=ppc64le" } } }, { "category": "product_version", "name": "mod_ssl-debuginfo-1:2.4.53-7.el9.ppc64le", "product": { "name": "mod_ssl-debuginfo-1:2.4.53-7.el9.ppc64le", "product_id": "mod_ssl-debuginfo-1:2.4.53-7.el9.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ssl-debuginfo@2.4.53-7.el9?arch=ppc64le\u0026epoch=1" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "httpd-0:2.4.53-7.el9.x86_64", "product": { "name": "httpd-0:2.4.53-7.el9.x86_64", "product_id": "httpd-0:2.4.53-7.el9.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd@2.4.53-7.el9?arch=x86_64" } } }, { "category": "product_version", "name": "httpd-core-0:2.4.53-7.el9.x86_64", "product": { "name": "httpd-core-0:2.4.53-7.el9.x86_64", "product_id": "httpd-core-0:2.4.53-7.el9.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-core@2.4.53-7.el9?arch=x86_64" } } }, { "category": "product_version", "name": "httpd-devel-0:2.4.53-7.el9.x86_64", "product": { "name": "httpd-devel-0:2.4.53-7.el9.x86_64", "product_id": "httpd-devel-0:2.4.53-7.el9.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-devel@2.4.53-7.el9?arch=x86_64" } } }, { "category": "product_version", "name": "httpd-tools-0:2.4.53-7.el9.x86_64", "product": { "name": "httpd-tools-0:2.4.53-7.el9.x86_64", "product_id": "httpd-tools-0:2.4.53-7.el9.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-tools@2.4.53-7.el9?arch=x86_64" } } }, { "category": "product_version", "name": "mod_ldap-0:2.4.53-7.el9.x86_64", "product": { "name": "mod_ldap-0:2.4.53-7.el9.x86_64", "product_id": "mod_ldap-0:2.4.53-7.el9.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ldap@2.4.53-7.el9?arch=x86_64" } } }, { "category": "product_version", "name": "mod_lua-0:2.4.53-7.el9.x86_64", "product": { "name": "mod_lua-0:2.4.53-7.el9.x86_64", "product_id": "mod_lua-0:2.4.53-7.el9.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_lua@2.4.53-7.el9?arch=x86_64" } } }, { "category": "product_version", "name": "mod_proxy_html-1:2.4.53-7.el9.x86_64", "product": { "name": "mod_proxy_html-1:2.4.53-7.el9.x86_64", "product_id": "mod_proxy_html-1:2.4.53-7.el9.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_proxy_html@2.4.53-7.el9?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_session-0:2.4.53-7.el9.x86_64", "product": { "name": "mod_session-0:2.4.53-7.el9.x86_64", "product_id": "mod_session-0:2.4.53-7.el9.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_session@2.4.53-7.el9?arch=x86_64" } } }, { "category": "product_version", "name": "mod_ssl-1:2.4.53-7.el9.x86_64", "product": { "name": "mod_ssl-1:2.4.53-7.el9.x86_64", "product_id": "mod_ssl-1:2.4.53-7.el9.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ssl@2.4.53-7.el9?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "httpd-debugsource-0:2.4.53-7.el9.x86_64", "product": { "name": "httpd-debugsource-0:2.4.53-7.el9.x86_64", "product_id": "httpd-debugsource-0:2.4.53-7.el9.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-debugsource@2.4.53-7.el9?arch=x86_64" } } }, { "category": "product_version", "name": "httpd-core-debuginfo-0:2.4.53-7.el9.x86_64", "product": { "name": "httpd-core-debuginfo-0:2.4.53-7.el9.x86_64", "product_id": "httpd-core-debuginfo-0:2.4.53-7.el9.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-core-debuginfo@2.4.53-7.el9?arch=x86_64" } } }, { "category": "product_version", "name": "httpd-debuginfo-0:2.4.53-7.el9.x86_64", "product": { "name": "httpd-debuginfo-0:2.4.53-7.el9.x86_64", "product_id": "httpd-debuginfo-0:2.4.53-7.el9.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-debuginfo@2.4.53-7.el9?arch=x86_64" } } }, { "category": "product_version", "name": "httpd-tools-debuginfo-0:2.4.53-7.el9.x86_64", "product": { "name": "httpd-tools-debuginfo-0:2.4.53-7.el9.x86_64", "product_id": "httpd-tools-debuginfo-0:2.4.53-7.el9.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-tools-debuginfo@2.4.53-7.el9?arch=x86_64" } } }, { "category": "product_version", "name": "mod_ldap-debuginfo-0:2.4.53-7.el9.x86_64", "product": { "name": "mod_ldap-debuginfo-0:2.4.53-7.el9.x86_64", "product_id": "mod_ldap-debuginfo-0:2.4.53-7.el9.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ldap-debuginfo@2.4.53-7.el9?arch=x86_64" } } }, { "category": "product_version", "name": "mod_lua-debuginfo-0:2.4.53-7.el9.x86_64", "product": { "name": "mod_lua-debuginfo-0:2.4.53-7.el9.x86_64", "product_id": "mod_lua-debuginfo-0:2.4.53-7.el9.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_lua-debuginfo@2.4.53-7.el9?arch=x86_64" } } }, { "category": "product_version", "name": "mod_proxy_html-debuginfo-1:2.4.53-7.el9.x86_64", "product": { "name": "mod_proxy_html-debuginfo-1:2.4.53-7.el9.x86_64", "product_id": "mod_proxy_html-debuginfo-1:2.4.53-7.el9.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_proxy_html-debuginfo@2.4.53-7.el9?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_session-debuginfo-0:2.4.53-7.el9.x86_64", "product": { "name": "mod_session-debuginfo-0:2.4.53-7.el9.x86_64", "product_id": "mod_session-debuginfo-0:2.4.53-7.el9.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_session-debuginfo@2.4.53-7.el9?arch=x86_64" } } }, { "category": "product_version", "name": "mod_ssl-debuginfo-1:2.4.53-7.el9.x86_64", "product": { "name": "mod_ssl-debuginfo-1:2.4.53-7.el9.x86_64", "product_id": "mod_ssl-debuginfo-1:2.4.53-7.el9.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ssl-debuginfo@2.4.53-7.el9?arch=x86_64\u0026epoch=1" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "httpd-0:2.4.53-7.el9.s390x", "product": { "name": "httpd-0:2.4.53-7.el9.s390x", "product_id": "httpd-0:2.4.53-7.el9.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd@2.4.53-7.el9?arch=s390x" } } }, { "category": "product_version", "name": "httpd-core-0:2.4.53-7.el9.s390x", "product": { "name": "httpd-core-0:2.4.53-7.el9.s390x", "product_id": "httpd-core-0:2.4.53-7.el9.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-core@2.4.53-7.el9?arch=s390x" } } }, { "category": "product_version", "name": "httpd-devel-0:2.4.53-7.el9.s390x", "product": { "name": "httpd-devel-0:2.4.53-7.el9.s390x", "product_id": "httpd-devel-0:2.4.53-7.el9.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-devel@2.4.53-7.el9?arch=s390x" } } }, { "category": "product_version", "name": "httpd-tools-0:2.4.53-7.el9.s390x", "product": { "name": "httpd-tools-0:2.4.53-7.el9.s390x", "product_id": "httpd-tools-0:2.4.53-7.el9.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-tools@2.4.53-7.el9?arch=s390x" } } }, { "category": "product_version", "name": "mod_ldap-0:2.4.53-7.el9.s390x", "product": { "name": "mod_ldap-0:2.4.53-7.el9.s390x", "product_id": "mod_ldap-0:2.4.53-7.el9.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ldap@2.4.53-7.el9?arch=s390x" } } }, { "category": "product_version", "name": "mod_lua-0:2.4.53-7.el9.s390x", "product": { "name": "mod_lua-0:2.4.53-7.el9.s390x", "product_id": "mod_lua-0:2.4.53-7.el9.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_lua@2.4.53-7.el9?arch=s390x" } } }, { "category": "product_version", "name": "mod_proxy_html-1:2.4.53-7.el9.s390x", "product": { "name": "mod_proxy_html-1:2.4.53-7.el9.s390x", "product_id": "mod_proxy_html-1:2.4.53-7.el9.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_proxy_html@2.4.53-7.el9?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_session-0:2.4.53-7.el9.s390x", "product": { "name": "mod_session-0:2.4.53-7.el9.s390x", "product_id": "mod_session-0:2.4.53-7.el9.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_session@2.4.53-7.el9?arch=s390x" } } }, { "category": "product_version", "name": "mod_ssl-1:2.4.53-7.el9.s390x", "product": { "name": "mod_ssl-1:2.4.53-7.el9.s390x", "product_id": "mod_ssl-1:2.4.53-7.el9.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ssl@2.4.53-7.el9?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "httpd-debugsource-0:2.4.53-7.el9.s390x", "product": { "name": "httpd-debugsource-0:2.4.53-7.el9.s390x", "product_id": "httpd-debugsource-0:2.4.53-7.el9.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-debugsource@2.4.53-7.el9?arch=s390x" } } }, { "category": "product_version", "name": "httpd-core-debuginfo-0:2.4.53-7.el9.s390x", "product": { "name": "httpd-core-debuginfo-0:2.4.53-7.el9.s390x", "product_id": "httpd-core-debuginfo-0:2.4.53-7.el9.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-core-debuginfo@2.4.53-7.el9?arch=s390x" } } }, { "category": "product_version", "name": "httpd-debuginfo-0:2.4.53-7.el9.s390x", "product": { "name": "httpd-debuginfo-0:2.4.53-7.el9.s390x", "product_id": "httpd-debuginfo-0:2.4.53-7.el9.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-debuginfo@2.4.53-7.el9?arch=s390x" } } }, { "category": "product_version", "name": "httpd-tools-debuginfo-0:2.4.53-7.el9.s390x", "product": { "name": "httpd-tools-debuginfo-0:2.4.53-7.el9.s390x", "product_id": "httpd-tools-debuginfo-0:2.4.53-7.el9.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-tools-debuginfo@2.4.53-7.el9?arch=s390x" } } }, { "category": "product_version", "name": "mod_ldap-debuginfo-0:2.4.53-7.el9.s390x", "product": { "name": "mod_ldap-debuginfo-0:2.4.53-7.el9.s390x", "product_id": "mod_ldap-debuginfo-0:2.4.53-7.el9.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ldap-debuginfo@2.4.53-7.el9?arch=s390x" } } }, { "category": "product_version", "name": "mod_lua-debuginfo-0:2.4.53-7.el9.s390x", "product": { "name": "mod_lua-debuginfo-0:2.4.53-7.el9.s390x", "product_id": "mod_lua-debuginfo-0:2.4.53-7.el9.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_lua-debuginfo@2.4.53-7.el9?arch=s390x" } } }, { "category": "product_version", "name": "mod_proxy_html-debuginfo-1:2.4.53-7.el9.s390x", "product": { "name": "mod_proxy_html-debuginfo-1:2.4.53-7.el9.s390x", "product_id": "mod_proxy_html-debuginfo-1:2.4.53-7.el9.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_proxy_html-debuginfo@2.4.53-7.el9?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_session-debuginfo-0:2.4.53-7.el9.s390x", "product": { "name": "mod_session-debuginfo-0:2.4.53-7.el9.s390x", "product_id": "mod_session-debuginfo-0:2.4.53-7.el9.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_session-debuginfo@2.4.53-7.el9?arch=s390x" } } }, { "category": "product_version", "name": "mod_ssl-debuginfo-1:2.4.53-7.el9.s390x", "product": { "name": "mod_ssl-debuginfo-1:2.4.53-7.el9.s390x", "product_id": "mod_ssl-debuginfo-1:2.4.53-7.el9.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ssl-debuginfo@2.4.53-7.el9?arch=s390x\u0026epoch=1" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "httpd-filesystem-0:2.4.53-7.el9.noarch", "product": { "name": "httpd-filesystem-0:2.4.53-7.el9.noarch", "product_id": "httpd-filesystem-0:2.4.53-7.el9.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-filesystem@2.4.53-7.el9?arch=noarch" } } }, { "category": "product_version", "name": "httpd-manual-0:2.4.53-7.el9.noarch", "product": { "name": "httpd-manual-0:2.4.53-7.el9.noarch", "product_id": "httpd-manual-0:2.4.53-7.el9.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-manual@2.4.53-7.el9?arch=noarch" } } } ], "category": "architecture", "name": "noarch" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.53-7.el9.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.aarch64" }, "product_reference": "httpd-0:2.4.53-7.el9.aarch64", "relates_to_product_reference": "AppStream-9.1.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.53-7.el9.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.ppc64le" }, "product_reference": "httpd-0:2.4.53-7.el9.ppc64le", "relates_to_product_reference": "AppStream-9.1.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.53-7.el9.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.s390x" }, "product_reference": "httpd-0:2.4.53-7.el9.s390x", "relates_to_product_reference": "AppStream-9.1.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.53-7.el9.src as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.src" }, "product_reference": "httpd-0:2.4.53-7.el9.src", "relates_to_product_reference": "AppStream-9.1.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.53-7.el9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.x86_64" }, "product_reference": "httpd-0:2.4.53-7.el9.x86_64", "relates_to_product_reference": "AppStream-9.1.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-core-0:2.4.53-7.el9.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.aarch64" }, "product_reference": "httpd-core-0:2.4.53-7.el9.aarch64", "relates_to_product_reference": "AppStream-9.1.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-core-0:2.4.53-7.el9.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.ppc64le" }, "product_reference": "httpd-core-0:2.4.53-7.el9.ppc64le", "relates_to_product_reference": "AppStream-9.1.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-core-0:2.4.53-7.el9.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.s390x" }, "product_reference": "httpd-core-0:2.4.53-7.el9.s390x", "relates_to_product_reference": "AppStream-9.1.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-core-0:2.4.53-7.el9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.x86_64" }, "product_reference": "httpd-core-0:2.4.53-7.el9.x86_64", "relates_to_product_reference": "AppStream-9.1.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-core-debuginfo-0:2.4.53-7.el9.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.aarch64" }, "product_reference": "httpd-core-debuginfo-0:2.4.53-7.el9.aarch64", "relates_to_product_reference": "AppStream-9.1.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-core-debuginfo-0:2.4.53-7.el9.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.ppc64le" }, "product_reference": "httpd-core-debuginfo-0:2.4.53-7.el9.ppc64le", "relates_to_product_reference": "AppStream-9.1.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-core-debuginfo-0:2.4.53-7.el9.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.s390x" }, "product_reference": "httpd-core-debuginfo-0:2.4.53-7.el9.s390x", "relates_to_product_reference": "AppStream-9.1.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-core-debuginfo-0:2.4.53-7.el9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.x86_64" }, "product_reference": "httpd-core-debuginfo-0:2.4.53-7.el9.x86_64", "relates_to_product_reference": "AppStream-9.1.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.4.53-7.el9.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.aarch64" }, "product_reference": "httpd-debuginfo-0:2.4.53-7.el9.aarch64", "relates_to_product_reference": "AppStream-9.1.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.4.53-7.el9.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.ppc64le" }, "product_reference": "httpd-debuginfo-0:2.4.53-7.el9.ppc64le", "relates_to_product_reference": "AppStream-9.1.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.4.53-7.el9.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.s390x" }, "product_reference": "httpd-debuginfo-0:2.4.53-7.el9.s390x", "relates_to_product_reference": "AppStream-9.1.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.4.53-7.el9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.x86_64" }, "product_reference": "httpd-debuginfo-0:2.4.53-7.el9.x86_64", "relates_to_product_reference": "AppStream-9.1.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debugsource-0:2.4.53-7.el9.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.aarch64" }, "product_reference": "httpd-debugsource-0:2.4.53-7.el9.aarch64", "relates_to_product_reference": "AppStream-9.1.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debugsource-0:2.4.53-7.el9.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.ppc64le" }, "product_reference": "httpd-debugsource-0:2.4.53-7.el9.ppc64le", "relates_to_product_reference": "AppStream-9.1.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debugsource-0:2.4.53-7.el9.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.s390x" }, "product_reference": "httpd-debugsource-0:2.4.53-7.el9.s390x", "relates_to_product_reference": "AppStream-9.1.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debugsource-0:2.4.53-7.el9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.x86_64" }, "product_reference": "httpd-debugsource-0:2.4.53-7.el9.x86_64", "relates_to_product_reference": "AppStream-9.1.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.4.53-7.el9.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.aarch64" }, "product_reference": "httpd-devel-0:2.4.53-7.el9.aarch64", "relates_to_product_reference": "AppStream-9.1.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.4.53-7.el9.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.ppc64le" }, "product_reference": "httpd-devel-0:2.4.53-7.el9.ppc64le", "relates_to_product_reference": "AppStream-9.1.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.4.53-7.el9.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.s390x" }, "product_reference": "httpd-devel-0:2.4.53-7.el9.s390x", "relates_to_product_reference": "AppStream-9.1.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.4.53-7.el9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.x86_64" }, "product_reference": "httpd-devel-0:2.4.53-7.el9.x86_64", "relates_to_product_reference": "AppStream-9.1.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-filesystem-0:2.4.53-7.el9.noarch as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.1.0.GA:httpd-filesystem-0:2.4.53-7.el9.noarch" }, "product_reference": "httpd-filesystem-0:2.4.53-7.el9.noarch", "relates_to_product_reference": "AppStream-9.1.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-manual-0:2.4.53-7.el9.noarch as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.1.0.GA:httpd-manual-0:2.4.53-7.el9.noarch" }, "product_reference": "httpd-manual-0:2.4.53-7.el9.noarch", "relates_to_product_reference": "AppStream-9.1.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-0:2.4.53-7.el9.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.aarch64" }, "product_reference": "httpd-tools-0:2.4.53-7.el9.aarch64", "relates_to_product_reference": "AppStream-9.1.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-0:2.4.53-7.el9.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.ppc64le" }, "product_reference": "httpd-tools-0:2.4.53-7.el9.ppc64le", "relates_to_product_reference": "AppStream-9.1.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-0:2.4.53-7.el9.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.s390x" }, "product_reference": "httpd-tools-0:2.4.53-7.el9.s390x", "relates_to_product_reference": "AppStream-9.1.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-0:2.4.53-7.el9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.x86_64" }, "product_reference": "httpd-tools-0:2.4.53-7.el9.x86_64", "relates_to_product_reference": "AppStream-9.1.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-debuginfo-0:2.4.53-7.el9.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.aarch64" }, "product_reference": "httpd-tools-debuginfo-0:2.4.53-7.el9.aarch64", "relates_to_product_reference": "AppStream-9.1.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-debuginfo-0:2.4.53-7.el9.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.ppc64le" }, "product_reference": "httpd-tools-debuginfo-0:2.4.53-7.el9.ppc64le", "relates_to_product_reference": "AppStream-9.1.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-debuginfo-0:2.4.53-7.el9.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.s390x" }, "product_reference": "httpd-tools-debuginfo-0:2.4.53-7.el9.s390x", "relates_to_product_reference": "AppStream-9.1.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-debuginfo-0:2.4.53-7.el9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.x86_64" }, "product_reference": "httpd-tools-debuginfo-0:2.4.53-7.el9.x86_64", "relates_to_product_reference": "AppStream-9.1.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-0:2.4.53-7.el9.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.aarch64" }, "product_reference": "mod_ldap-0:2.4.53-7.el9.aarch64", "relates_to_product_reference": "AppStream-9.1.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-0:2.4.53-7.el9.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.ppc64le" }, "product_reference": "mod_ldap-0:2.4.53-7.el9.ppc64le", "relates_to_product_reference": "AppStream-9.1.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-0:2.4.53-7.el9.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.s390x" }, "product_reference": "mod_ldap-0:2.4.53-7.el9.s390x", "relates_to_product_reference": "AppStream-9.1.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-0:2.4.53-7.el9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.x86_64" }, "product_reference": "mod_ldap-0:2.4.53-7.el9.x86_64", "relates_to_product_reference": "AppStream-9.1.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-debuginfo-0:2.4.53-7.el9.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.aarch64" }, "product_reference": "mod_ldap-debuginfo-0:2.4.53-7.el9.aarch64", "relates_to_product_reference": "AppStream-9.1.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-debuginfo-0:2.4.53-7.el9.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.ppc64le" }, "product_reference": "mod_ldap-debuginfo-0:2.4.53-7.el9.ppc64le", "relates_to_product_reference": "AppStream-9.1.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-debuginfo-0:2.4.53-7.el9.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.s390x" }, "product_reference": "mod_ldap-debuginfo-0:2.4.53-7.el9.s390x", "relates_to_product_reference": "AppStream-9.1.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-debuginfo-0:2.4.53-7.el9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.x86_64" }, "product_reference": "mod_ldap-debuginfo-0:2.4.53-7.el9.x86_64", "relates_to_product_reference": "AppStream-9.1.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "mod_lua-0:2.4.53-7.el9.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.aarch64" }, "product_reference": "mod_lua-0:2.4.53-7.el9.aarch64", "relates_to_product_reference": "AppStream-9.1.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "mod_lua-0:2.4.53-7.el9.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.ppc64le" }, "product_reference": "mod_lua-0:2.4.53-7.el9.ppc64le", "relates_to_product_reference": "AppStream-9.1.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "mod_lua-0:2.4.53-7.el9.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.s390x" }, "product_reference": "mod_lua-0:2.4.53-7.el9.s390x", "relates_to_product_reference": "AppStream-9.1.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "mod_lua-0:2.4.53-7.el9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.x86_64" }, "product_reference": "mod_lua-0:2.4.53-7.el9.x86_64", "relates_to_product_reference": "AppStream-9.1.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "mod_lua-debuginfo-0:2.4.53-7.el9.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.aarch64" }, "product_reference": "mod_lua-debuginfo-0:2.4.53-7.el9.aarch64", "relates_to_product_reference": "AppStream-9.1.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "mod_lua-debuginfo-0:2.4.53-7.el9.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.ppc64le" }, "product_reference": "mod_lua-debuginfo-0:2.4.53-7.el9.ppc64le", "relates_to_product_reference": "AppStream-9.1.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "mod_lua-debuginfo-0:2.4.53-7.el9.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.s390x" }, "product_reference": "mod_lua-debuginfo-0:2.4.53-7.el9.s390x", "relates_to_product_reference": "AppStream-9.1.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "mod_lua-debuginfo-0:2.4.53-7.el9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.x86_64" }, "product_reference": "mod_lua-debuginfo-0:2.4.53-7.el9.x86_64", "relates_to_product_reference": "AppStream-9.1.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-1:2.4.53-7.el9.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.aarch64" }, "product_reference": "mod_proxy_html-1:2.4.53-7.el9.aarch64", "relates_to_product_reference": "AppStream-9.1.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-1:2.4.53-7.el9.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.ppc64le" }, "product_reference": "mod_proxy_html-1:2.4.53-7.el9.ppc64le", "relates_to_product_reference": "AppStream-9.1.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-1:2.4.53-7.el9.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.s390x" }, "product_reference": "mod_proxy_html-1:2.4.53-7.el9.s390x", "relates_to_product_reference": "AppStream-9.1.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-1:2.4.53-7.el9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.x86_64" }, "product_reference": "mod_proxy_html-1:2.4.53-7.el9.x86_64", "relates_to_product_reference": "AppStream-9.1.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-debuginfo-1:2.4.53-7.el9.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.aarch64" }, "product_reference": "mod_proxy_html-debuginfo-1:2.4.53-7.el9.aarch64", "relates_to_product_reference": "AppStream-9.1.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-debuginfo-1:2.4.53-7.el9.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.ppc64le" }, "product_reference": "mod_proxy_html-debuginfo-1:2.4.53-7.el9.ppc64le", "relates_to_product_reference": "AppStream-9.1.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-debuginfo-1:2.4.53-7.el9.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.s390x" }, "product_reference": "mod_proxy_html-debuginfo-1:2.4.53-7.el9.s390x", "relates_to_product_reference": "AppStream-9.1.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-debuginfo-1:2.4.53-7.el9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.x86_64" }, "product_reference": "mod_proxy_html-debuginfo-1:2.4.53-7.el9.x86_64", "relates_to_product_reference": "AppStream-9.1.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-0:2.4.53-7.el9.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.aarch64" }, "product_reference": "mod_session-0:2.4.53-7.el9.aarch64", "relates_to_product_reference": "AppStream-9.1.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-0:2.4.53-7.el9.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.ppc64le" }, "product_reference": "mod_session-0:2.4.53-7.el9.ppc64le", "relates_to_product_reference": "AppStream-9.1.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-0:2.4.53-7.el9.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.s390x" }, "product_reference": "mod_session-0:2.4.53-7.el9.s390x", "relates_to_product_reference": "AppStream-9.1.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-0:2.4.53-7.el9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.x86_64" }, "product_reference": "mod_session-0:2.4.53-7.el9.x86_64", "relates_to_product_reference": "AppStream-9.1.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-debuginfo-0:2.4.53-7.el9.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.aarch64" }, "product_reference": "mod_session-debuginfo-0:2.4.53-7.el9.aarch64", "relates_to_product_reference": "AppStream-9.1.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-debuginfo-0:2.4.53-7.el9.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.ppc64le" }, "product_reference": "mod_session-debuginfo-0:2.4.53-7.el9.ppc64le", "relates_to_product_reference": "AppStream-9.1.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-debuginfo-0:2.4.53-7.el9.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.s390x" }, "product_reference": "mod_session-debuginfo-0:2.4.53-7.el9.s390x", "relates_to_product_reference": "AppStream-9.1.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-debuginfo-0:2.4.53-7.el9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.x86_64" }, "product_reference": "mod_session-debuginfo-0:2.4.53-7.el9.x86_64", "relates_to_product_reference": "AppStream-9.1.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.4.53-7.el9.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.aarch64" }, "product_reference": "mod_ssl-1:2.4.53-7.el9.aarch64", "relates_to_product_reference": "AppStream-9.1.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.4.53-7.el9.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.ppc64le" }, "product_reference": "mod_ssl-1:2.4.53-7.el9.ppc64le", "relates_to_product_reference": "AppStream-9.1.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.4.53-7.el9.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.s390x" }, "product_reference": "mod_ssl-1:2.4.53-7.el9.s390x", "relates_to_product_reference": "AppStream-9.1.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.4.53-7.el9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.x86_64" }, "product_reference": "mod_ssl-1:2.4.53-7.el9.x86_64", "relates_to_product_reference": "AppStream-9.1.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-debuginfo-1:2.4.53-7.el9.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.aarch64" }, "product_reference": "mod_ssl-debuginfo-1:2.4.53-7.el9.aarch64", "relates_to_product_reference": "AppStream-9.1.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-debuginfo-1:2.4.53-7.el9.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.ppc64le" }, "product_reference": "mod_ssl-debuginfo-1:2.4.53-7.el9.ppc64le", "relates_to_product_reference": "AppStream-9.1.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-debuginfo-1:2.4.53-7.el9.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.s390x" }, "product_reference": "mod_ssl-debuginfo-1:2.4.53-7.el9.s390x", "relates_to_product_reference": "AppStream-9.1.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-debuginfo-1:2.4.53-7.el9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.x86_64" }, "product_reference": "mod_ssl-debuginfo-1:2.4.53-7.el9.x86_64", "relates_to_product_reference": "AppStream-9.1.0.GA" } ] }, "vulnerabilities": [ { "cve": "CVE-2022-22719", "cwe": { "id": "CWE-908", "name": "Use of Uninitialized Resource" }, "discovery_date": "2022-03-15T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2064322" } ], "notes": [ { "category": "description", "text": "A flaw was found in the mod_lua module of httpd. A crafted request body can cause a read to a random memory area due to an uninitialized value in functions called by the parsebody function. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "httpd: mod_lua: Use of uninitialized value of in r:parsebody", "title": "Vulnerability summary" }, { "category": "other", "text": "httpd as shipped with Red Hat Enterprise Linux 6, is not affected by this flaw because it does not ship mod_lua.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.src", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-filesystem-0:2.4.53-7.el9.noarch", "AppStream-9.1.0.GA:httpd-manual-0:2.4.53-7.el9.noarch", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-22719" }, { "category": "external", "summary": "RHBZ#2064322", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2064322" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-22719", "url": "https://www.cve.org/CVERecord?id=CVE-2022-22719" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-22719", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-22719" }, { "category": "external", "summary": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2022-22719", "url": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2022-22719" } ], "release_date": "2022-03-14T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-11-15T09:58:32+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically.", "product_ids": [ "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.src", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-filesystem-0:2.4.53-7.el9.noarch", "AppStream-9.1.0.GA:httpd-manual-0:2.4.53-7.el9.noarch", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:8067" }, { "category": "workaround", "details": "Disabling mod_lua and restarting httpd will mitigate this flaw. See https://access.redhat.com/articles/10649 for more information.", "product_ids": [ "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.src", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-filesystem-0:2.4.53-7.el9.noarch", "AppStream-9.1.0.GA:httpd-manual-0:2.4.53-7.el9.noarch", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.src", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-filesystem-0:2.4.53-7.el9.noarch", "AppStream-9.1.0.GA:httpd-manual-0:2.4.53-7.el9.noarch", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "httpd: mod_lua: Use of uninitialized value of in r:parsebody" }, { "cve": "CVE-2022-22721", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "discovery_date": "2022-03-15T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2064320" } ], "notes": [ { "category": "description", "text": "A flaw was found in httpd, where it incorrectly limits the value of the LimitXMLRequestBody option. This issue can lead to an integer overflow and later causes an out-of-bounds write.", "title": "Vulnerability description" }, { "category": "summary", "text": "httpd: core: Possible buffer overflow with very large or unlimited LimitXMLRequestBody", "title": "Vulnerability summary" }, { "category": "other", "text": "The default configuration of the LimitXMLRequestBody option on RHEL is 1MB and therefore is not vulnerable to this flaw. Also, this issue is known to only affect 32bit httpd builds.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.src", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-filesystem-0:2.4.53-7.el9.noarch", "AppStream-9.1.0.GA:httpd-manual-0:2.4.53-7.el9.noarch", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-22721" }, { "category": "external", "summary": "RHBZ#2064320", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2064320" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-22721", "url": "https://www.cve.org/CVERecord?id=CVE-2022-22721" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-22721", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-22721" }, { "category": "external", "summary": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2022-22721", "url": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2022-22721" } ], "release_date": "2022-03-14T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-11-15T09:58:32+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically.", "product_ids": [ "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.src", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-filesystem-0:2.4.53-7.el9.noarch", "AppStream-9.1.0.GA:httpd-manual-0:2.4.53-7.el9.noarch", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:8067" }, { "category": "workaround", "details": "Set the LimitXMLRequestBody option to a value smaller than 350MB. Setting it to 0 is not recommended as it will use a hard limit (depending on 32bit or 64bit systems) which may result in an overall system out-of-memory. The default configuration is not vulnerable to this flaw, see the statement above.", "product_ids": [ "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.src", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-filesystem-0:2.4.53-7.el9.noarch", "AppStream-9.1.0.GA:httpd-manual-0:2.4.53-7.el9.noarch", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.4, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:H", "version": "3.1" }, "products": [ "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.src", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-filesystem-0:2.4.53-7.el9.noarch", "AppStream-9.1.0.GA:httpd-manual-0:2.4.53-7.el9.noarch", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "httpd: core: Possible buffer overflow with very large or unlimited LimitXMLRequestBody" }, { "cve": "CVE-2022-23943", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "discovery_date": "2022-03-15T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2064319" } ], "notes": [ { "category": "description", "text": "An out-of-bounds read/write vulnerability was found in the mod_sed module of httpd. This flaw allows an attacker to overwrite the memory of an httpd instance that is using mod_sed with data provided by the attacker.", "title": "Vulnerability description" }, { "category": "summary", "text": "httpd: mod_sed: Read/write beyond bounds", "title": "Vulnerability summary" }, { "category": "other", "text": "The `mod_sed` module is disabled by default on Red Hat Enterprise Linux 7 and 8. For this reason, the flaw has been rated as having a security impact of Moderate. The httpd package as shipped with Red Hat Enterprise Linux 6 is not affected by this flaw because the `mod_sed` module is available only in httpd 2.3 and later.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.src", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-filesystem-0:2.4.53-7.el9.noarch", "AppStream-9.1.0.GA:httpd-manual-0:2.4.53-7.el9.noarch", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-23943" }, { "category": "external", "summary": "RHBZ#2064319", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2064319" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-23943", "url": "https://www.cve.org/CVERecord?id=CVE-2022-23943" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-23943", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-23943" }, { "category": "external", "summary": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2022-23943", "url": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2022-23943" } ], "release_date": "2022-03-14T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-11-15T09:58:32+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically.", "product_ids": [ "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.src", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-filesystem-0:2.4.53-7.el9.noarch", "AppStream-9.1.0.GA:httpd-manual-0:2.4.53-7.el9.noarch", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:8067" }, { "category": "workaround", "details": "Disabling mod_sed and restarting httpd will mitigate this flaw. See https://access.redhat.com/articles/10649 for more information.", "product_ids": [ "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.src", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-filesystem-0:2.4.53-7.el9.noarch", "AppStream-9.1.0.GA:httpd-manual-0:2.4.53-7.el9.noarch", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.src", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-filesystem-0:2.4.53-7.el9.noarch", "AppStream-9.1.0.GA:httpd-manual-0:2.4.53-7.el9.noarch", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "httpd: mod_sed: Read/write beyond bounds" }, { "cve": "CVE-2022-26377", "cwe": { "id": "CWE-444", "name": "Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027)" }, "discovery_date": "2022-06-08T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2094997" } ], "notes": [ { "category": "description", "text": "An HTTP request smuggling vulnerability was found in the mod_proxy_ajp module of httpd. This flaw allows an attacker to smuggle requests to the AJP server, where it forwards requests.", "title": "Vulnerability description" }, { "category": "summary", "text": "httpd: mod_proxy_ajp: Possible request smuggling", "title": "Vulnerability summary" }, { "category": "other", "text": "The httpd mod_proxy_ajp module is enabled by default on Red Hat Enterprise Linux 8, 9, and in RHSCL. However, there are no directives forwarding requests using the AJP protocol.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.src", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-filesystem-0:2.4.53-7.el9.noarch", "AppStream-9.1.0.GA:httpd-manual-0:2.4.53-7.el9.noarch", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-26377" }, { "category": "external", "summary": "RHBZ#2094997", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2094997" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-26377", "url": "https://www.cve.org/CVERecord?id=CVE-2022-26377" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-26377", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-26377" }, { "category": "external", "summary": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2022-26377", "url": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2022-26377" } ], "release_date": "2022-06-08T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-11-15T09:58:32+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically.", "product_ids": [ "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.src", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-filesystem-0:2.4.53-7.el9.noarch", "AppStream-9.1.0.GA:httpd-manual-0:2.4.53-7.el9.noarch", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:8067" }, { "category": "workaround", "details": "Disabling mod_proxy_ajp and restarting httpd will mitigate this flaw.", "product_ids": [ "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.src", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-filesystem-0:2.4.53-7.el9.noarch", "AppStream-9.1.0.GA:httpd-manual-0:2.4.53-7.el9.noarch", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:L", "version": "3.1" }, "products": [ "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.src", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-filesystem-0:2.4.53-7.el9.noarch", "AppStream-9.1.0.GA:httpd-manual-0:2.4.53-7.el9.noarch", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "httpd: mod_proxy_ajp: Possible request smuggling" }, { "cve": "CVE-2022-28614", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2022-06-08T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2095002" } ], "notes": [ { "category": "description", "text": "An out-of-bounds read vulnerability was found in httpd. A very large input to the ap_rputs and ap_rwrite functions can lead to an integer overflow and result in an out-of-bounds read.", "title": "Vulnerability description" }, { "category": "summary", "text": "httpd: Out-of-bounds read via ap_rwrite()", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.src", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-filesystem-0:2.4.53-7.el9.noarch", "AppStream-9.1.0.GA:httpd-manual-0:2.4.53-7.el9.noarch", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-28614" }, { "category": "external", "summary": "RHBZ#2095002", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2095002" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-28614", "url": "https://www.cve.org/CVERecord?id=CVE-2022-28614" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-28614", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-28614" }, { "category": "external", "summary": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2022-28614", "url": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2022-28614" } ], "release_date": "2022-06-08T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-11-15T09:58:32+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically.", "product_ids": [ "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.src", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-filesystem-0:2.4.53-7.el9.noarch", "AppStream-9.1.0.GA:httpd-manual-0:2.4.53-7.el9.noarch", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:8067" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.src", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-filesystem-0:2.4.53-7.el9.noarch", "AppStream-9.1.0.GA:httpd-manual-0:2.4.53-7.el9.noarch", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "httpd: Out-of-bounds read via ap_rwrite()" }, { "cve": "CVE-2022-28615", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "discovery_date": "2022-06-08T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2095006" } ], "notes": [ { "category": "description", "text": "An out-of-bounds read vulnerability was found in httpd. A very large input to the ap_strcmp_match function can lead to an integer overflow and result in an out-of-bounds read.", "title": "Vulnerability description" }, { "category": "summary", "text": "httpd: Out-of-bounds read in ap_strcmp_match()", "title": "Vulnerability summary" }, { "category": "other", "text": "According to upstream, no code distributed with the httpd server can exploit this flaw, however, third-party modules or Lua scripts that use the ap_strcmp_match function could potentially be affected.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.src", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-filesystem-0:2.4.53-7.el9.noarch", "AppStream-9.1.0.GA:httpd-manual-0:2.4.53-7.el9.noarch", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-28615" }, { "category": "external", "summary": "RHBZ#2095006", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2095006" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-28615", "url": "https://www.cve.org/CVERecord?id=CVE-2022-28615" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-28615", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-28615" }, { "category": "external", "summary": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2022-28615", "url": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2022-28615" } ], "release_date": "2022-06-08T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-11-15T09:58:32+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically.", "product_ids": [ "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.src", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-filesystem-0:2.4.53-7.el9.noarch", "AppStream-9.1.0.GA:httpd-manual-0:2.4.53-7.el9.noarch", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:8067" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.4, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H", "version": "3.1" }, "products": [ "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.src", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-filesystem-0:2.4.53-7.el9.noarch", "AppStream-9.1.0.GA:httpd-manual-0:2.4.53-7.el9.noarch", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "httpd: Out-of-bounds read in ap_strcmp_match()" }, { "cve": "CVE-2022-29404", "cwe": { "id": "CWE-770", "name": "Allocation of Resources Without Limits or Throttling" }, "discovery_date": "2022-06-08T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2095012" } ], "notes": [ { "category": "description", "text": "A flaw was found in the mod_lua module of httpd. A malicious request to a Lua script that calls parsebody(0) can lead to a denial of service due to no default limit on the possible input size.", "title": "Vulnerability description" }, { "category": "summary", "text": "httpd: mod_lua: DoS in r:parsebody", "title": "Vulnerability summary" }, { "category": "other", "text": "httpd as shipped with Red Hat Enterprise Linux 6, is not affected by this flaw because it does not ship mod_lua.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.src", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-filesystem-0:2.4.53-7.el9.noarch", "AppStream-9.1.0.GA:httpd-manual-0:2.4.53-7.el9.noarch", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-29404" }, { "category": "external", "summary": "RHBZ#2095012", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2095012" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-29404", "url": "https://www.cve.org/CVERecord?id=CVE-2022-29404" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-29404", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-29404" }, { "category": "external", "summary": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2022-29404", "url": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2022-29404" } ], "release_date": "2022-06-08T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-11-15T09:58:32+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically.", "product_ids": [ "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.src", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-filesystem-0:2.4.53-7.el9.noarch", "AppStream-9.1.0.GA:httpd-manual-0:2.4.53-7.el9.noarch", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:8067" }, { "category": "workaround", "details": "Disabling mod_lua and restarting httpd will mitigate this flaw.", "product_ids": [ "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.src", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-filesystem-0:2.4.53-7.el9.noarch", "AppStream-9.1.0.GA:httpd-manual-0:2.4.53-7.el9.noarch", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.src", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-filesystem-0:2.4.53-7.el9.noarch", "AppStream-9.1.0.GA:httpd-manual-0:2.4.53-7.el9.noarch", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "httpd: mod_lua: DoS in r:parsebody" }, { "cve": "CVE-2022-30522", "cwe": { "id": "CWE-789", "name": "Memory Allocation with Excessive Size Value" }, "discovery_date": "2022-06-08T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2095015" } ], "notes": [ { "category": "description", "text": "A flaw was found in the mod_sed module of httpd. A very large input to the mod_sed module can result in a denial of service due to excessively large memory allocations.", "title": "Vulnerability description" }, { "category": "summary", "text": "httpd: mod_sed: DoS vulnerability", "title": "Vulnerability summary" }, { "category": "other", "text": "The mod_sed module is disabled by default on Red Hat Enterprise Linux 7 and 8. The httpd package as shipped with Red Hat Enterprise Linux 6 is not affected by this flaw because the mod_sed module is not available.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.src", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-filesystem-0:2.4.53-7.el9.noarch", "AppStream-9.1.0.GA:httpd-manual-0:2.4.53-7.el9.noarch", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-30522" }, { "category": "external", "summary": "RHBZ#2095015", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2095015" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-30522", "url": "https://www.cve.org/CVERecord?id=CVE-2022-30522" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-30522", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-30522" }, { "category": "external", "summary": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2022-30522", "url": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2022-30522" } ], "release_date": "2022-06-08T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-11-15T09:58:32+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically.", "product_ids": [ "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.src", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-filesystem-0:2.4.53-7.el9.noarch", "AppStream-9.1.0.GA:httpd-manual-0:2.4.53-7.el9.noarch", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:8067" }, { "category": "workaround", "details": "Disabling mod_sed and restating httpd will mitigate this flaw.", "product_ids": [ "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.src", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-filesystem-0:2.4.53-7.el9.noarch", "AppStream-9.1.0.GA:httpd-manual-0:2.4.53-7.el9.noarch", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.src", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-filesystem-0:2.4.53-7.el9.noarch", "AppStream-9.1.0.GA:httpd-manual-0:2.4.53-7.el9.noarch", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "httpd: mod_sed: DoS vulnerability" }, { "cve": "CVE-2022-30556", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2022-06-08T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2095018" } ], "notes": [ { "category": "description", "text": "A flaw was found in the mod_lua module of httpd. The data returned by the wsread function may point past the end of the storage allocated for the buffer, resulting in information disclosure.", "title": "Vulnerability description" }, { "category": "summary", "text": "httpd: mod_lua: Information disclosure with websockets", "title": "Vulnerability summary" }, { "category": "other", "text": "httpd as shipped with Red Hat Enterprise Linux 6, is not affected by this flaw because it does not ship mod_lua. Red Hat Enterprise Linux 7 is not affected by this flaw because the wsread function is not available.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.src", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-filesystem-0:2.4.53-7.el9.noarch", "AppStream-9.1.0.GA:httpd-manual-0:2.4.53-7.el9.noarch", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-30556" }, { "category": "external", "summary": "RHBZ#2095018", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2095018" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-30556", "url": "https://www.cve.org/CVERecord?id=CVE-2022-30556" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-30556", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-30556" }, { "category": "external", "summary": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2022-30556", "url": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2022-30556" } ], "release_date": "2022-06-08T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-11-15T09:58:32+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically.", "product_ids": [ "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.src", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-filesystem-0:2.4.53-7.el9.noarch", "AppStream-9.1.0.GA:httpd-manual-0:2.4.53-7.el9.noarch", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:8067" }, { "category": "workaround", "details": "Disabling mod_lua and restarting httpd will mitigate this flaw.", "product_ids": [ "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.src", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-filesystem-0:2.4.53-7.el9.noarch", "AppStream-9.1.0.GA:httpd-manual-0:2.4.53-7.el9.noarch", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.src", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-filesystem-0:2.4.53-7.el9.noarch", "AppStream-9.1.0.GA:httpd-manual-0:2.4.53-7.el9.noarch", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "httpd: mod_lua: Information disclosure with websockets" }, { "cve": "CVE-2022-31813", "cwe": { "id": "CWE-348", "name": "Use of Less Trusted Source" }, "discovery_date": "2022-06-08T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2095020" } ], "notes": [ { "category": "description", "text": "A flaw was found in the mod_proxy module of httpd. The server may remove the X-Forwarded-* headers from a request based on the client-side Connection header hop-by-hop mechanism.", "title": "Vulnerability description" }, { "category": "summary", "text": "httpd: mod_proxy: X-Forwarded-For dropped by hop-by-hop mechanism", "title": "Vulnerability summary" }, { "category": "other", "text": "This flaw has been rated as having a security impact of Moderate, and is not currently planned to be addressed in future updates of Red Hat Enterprise Linux 7. Red Hat Enterprise Linux 7 is now in Maintenance Support 2 Phase of the support and maintenance life cycle. For additional information, refer to the Red Hat Enterprise Linux Life Cycle: https://access.redhat.com/support/policy/updates/errata.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.src", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-filesystem-0:2.4.53-7.el9.noarch", "AppStream-9.1.0.GA:httpd-manual-0:2.4.53-7.el9.noarch", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-31813" }, { "category": "external", "summary": "RHBZ#2095020", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2095020" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-31813", "url": "https://www.cve.org/CVERecord?id=CVE-2022-31813" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-31813", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-31813" }, { "category": "external", "summary": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2022-31813", "url": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2022-31813" } ], "release_date": "2022-06-08T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-11-15T09:58:32+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically.", "product_ids": [ "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.src", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-filesystem-0:2.4.53-7.el9.noarch", "AppStream-9.1.0.GA:httpd-manual-0:2.4.53-7.el9.noarch", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:8067" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.src", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-filesystem-0:2.4.53-7.el9.noarch", "AppStream-9.1.0.GA:httpd-manual-0:2.4.53-7.el9.noarch", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 7.3, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" }, "products": [ "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.src", "AppStream-9.1.0.GA:httpd-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-core-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-core-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-debugsource-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-devel-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-filesystem-0:2.4.53-7.el9.noarch", "AppStream-9.1.0.GA:httpd-manual-0:2.4.53-7.el9.noarch", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-tools-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:httpd-tools-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ldap-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ldap-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_lua-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_lua-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_proxy_html-1:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_proxy_html-debuginfo-1:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_session-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_session-debuginfo-0:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ssl-1:2.4.53-7.el9.x86_64", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.aarch64", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.ppc64le", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.s390x", "AppStream-9.1.0.GA:mod_ssl-debuginfo-1:2.4.53-7.el9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "httpd: mod_proxy: X-Forwarded-For dropped by hop-by-hop mechanism" } ] }
rhsa-2022_8840
Vulnerability from csaf_redhat
Published
2022-12-08 13:08
Modified
2024-12-15 21:10
Summary
Red Hat Security Advisory: Red Hat JBoss Core Services Apache HTTP Server 2.4.51 SP1 security update
Notes
Topic
An update is now available for Red Hat JBoss Core Services Apache HTTP Server 2.4.51 Service Pack 1 on Red Hat Enterprise Linux versions 7 and 8.
Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
Red Hat JBoss Core Services is a set of supplementary software for Red Hat JBoss middleware products. This software, such as Apache HTTP Server, is common to multiple JBoss middleware products, and is packaged under Red Hat JBoss Core Services to allow for faster distribution of updates, and for a more consistent update experience.
This release of Red Hat JBoss Core Services Apache HTTP Server 2.4.51 Service Pack 1 serves as a replacement for Red Hat JBoss Core Services Apache HTTP Server 2.4.51, and includes bug fixes and enhancements, which are documented in the Release Notes document linked to in the References.
Security Fix(es):
* httpd: mod_sed: Read/write beyond bounds (CVE-2022-23943)
* openssl: c_rehash script allows command injection (CVE-2022-1292)
* openssl: the c_rehash script allows command injection (CVE-2022-2068)
* httpd: core: Possible buffer overflow with very large or unlimited LimitXMLRequestBody (CVE-2022-22721)
* httpd: mod_proxy_ajp: Possible request smuggling (CVE-2022-26377)
* httpd: mod_sed: DoS vulnerability (CVE-2022-30522)
* httpd: mod_proxy: X-Forwarded-For dropped by hop-by-hop mechanism (CVE-2022-31813)
* curl: HTTP compression denial of service (CVE-2022-32206)
* curl: Unpreserved file permissions (CVE-2022-32207)
* curl: FTP-KRB bad message verification (CVE-2022-32208)
* curl: POST following PUT confusion (CVE-2022-32221)
* curl: HTTP proxy double-free (CVE-2022-42915)
* curl: HSTS bypass via IDN (CVE-2022-42916)
* curl: CERTINFO never-ending busy-loop (CVE-2022-27781)
* httpd: Out-of-bounds read via ap_rwrite() (CVE-2022-28614)
* httpd: Out-of-bounds read in ap_strcmp_match() (CVE-2022-28615)
* curl: control code in cookie denial of service (CVE-2022-35252)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update is now available for Red Hat JBoss Core Services Apache HTTP Server 2.4.51 Service Pack 1 on Red Hat Enterprise Linux versions 7 and 8.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Red Hat JBoss Core Services is a set of supplementary software for Red Hat JBoss middleware products. This software, such as Apache HTTP Server, is common to multiple JBoss middleware products, and is packaged under Red Hat JBoss Core Services to allow for faster distribution of updates, and for a more consistent update experience.\n\nThis release of Red Hat JBoss Core Services Apache HTTP Server 2.4.51 Service Pack 1 serves as a replacement for Red Hat JBoss Core Services Apache HTTP Server 2.4.51, and includes bug fixes and enhancements, which are documented in the Release Notes document linked to in the References.\n\nSecurity Fix(es):\n\n* httpd: mod_sed: Read/write beyond bounds (CVE-2022-23943)\n\n* openssl: c_rehash script allows command injection (CVE-2022-1292)\n\n* openssl: the c_rehash script allows command injection (CVE-2022-2068)\n\n* httpd: core: Possible buffer overflow with very large or unlimited LimitXMLRequestBody (CVE-2022-22721)\n\n* httpd: mod_proxy_ajp: Possible request smuggling (CVE-2022-26377)\n\n* httpd: mod_sed: DoS vulnerability (CVE-2022-30522)\n\n* httpd: mod_proxy: X-Forwarded-For dropped by hop-by-hop mechanism (CVE-2022-31813)\n\n* curl: HTTP compression denial of service (CVE-2022-32206)\n\n* curl: Unpreserved file permissions (CVE-2022-32207)\n\n* curl: FTP-KRB bad message verification (CVE-2022-32208)\n\n* curl: POST following PUT confusion (CVE-2022-32221)\n\n* curl: HTTP proxy double-free (CVE-2022-42915)\n\n* curl: HSTS bypass via IDN (CVE-2022-42916)\n\n* curl: CERTINFO never-ending busy-loop (CVE-2022-27781)\n\n* httpd: Out-of-bounds read via ap_rwrite() (CVE-2022-28614)\n\n* httpd: Out-of-bounds read in ap_strcmp_match() (CVE-2022-28615)\n\n* curl: control code in cookie denial of service (CVE-2022-35252)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2022:8840", "url": "https://access.redhat.com/errata/RHSA-2022:8840" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "2064319", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2064319" }, { "category": "external", "summary": "2064320", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2064320" }, { "category": "external", "summary": "2081494", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2081494" }, { "category": "external", "summary": "2082204", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2082204" }, { "category": "external", "summary": "2094997", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2094997" }, { "category": "external", "summary": "2095002", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2095002" }, { "category": "external", "summary": "2095006", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2095006" }, { "category": "external", "summary": "2095015", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2095015" }, { "category": "external", "summary": "2095020", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2095020" }, { "category": "external", "summary": "2097310", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2097310" }, { "category": "external", "summary": "2099300", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2099300" }, { "category": "external", "summary": "2099305", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2099305" }, { "category": "external", "summary": "2099306", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2099306" }, { "category": "external", "summary": "2120718", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2120718" }, { "category": "external", "summary": "2135411", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2135411" }, { "category": "external", "summary": "2135413", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2135413" }, { "category": "external", "summary": "2135416", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2135416" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2022/rhsa-2022_8840.json" } ], "title": "Red Hat Security Advisory: Red Hat JBoss Core Services Apache HTTP Server 2.4.51 SP1 security update", "tracking": { "current_release_date": "2024-12-15T21:10:54+00:00", "generator": { "date": "2024-12-15T21:10:54+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.3" } }, "id": "RHSA-2022:8840", "initial_release_date": "2022-12-08T13:08:14+00:00", "revision_history": [ { "date": "2022-12-08T13:08:14+00:00", "number": "1", "summary": "Initial version" }, { "date": "2023-01-18T11:26:22+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-12-15T21:10:54+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat JBoss Core Services on RHEL 7 Server", "product": { "name": "Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS", "product_identification_helper": { "cpe": "cpe:/a:redhat:jboss_core_services:1::el7" } } }, { "category": "product_name", "name": "Red Hat JBoss Core Services on RHEL 8", "product": { "name": "Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS", "product_identification_helper": { "cpe": "cpe:/a:redhat:jboss_core_services:1::el8" } } } ], "category": "product_family", "name": "Red Hat JBoss Core Services" }, { "branches": [ { "category": "product_version", "name": "jbcs-httpd24-openssl-pkcs11-0:0.4.10-32.el7jbcs.src", "product": { "name": "jbcs-httpd24-openssl-pkcs11-0:0.4.10-32.el7jbcs.src", "product_id": "jbcs-httpd24-openssl-pkcs11-0:0.4.10-32.el7jbcs.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-openssl-pkcs11@0.4.10-32.el7jbcs?arch=src" } } }, { "category": "product_version", "name": "jbcs-httpd24-openssl-chil-0:1.0.0-17.el7jbcs.src", "product": { "name": "jbcs-httpd24-openssl-chil-0:1.0.0-17.el7jbcs.src", "product_id": "jbcs-httpd24-openssl-chil-0:1.0.0-17.el7jbcs.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-openssl-chil@1.0.0-17.el7jbcs?arch=src" } } }, { "category": "product_version", "name": "jbcs-httpd24-nghttp2-0:1.43.0-11.el7jbcs.src", "product": { "name": "jbcs-httpd24-nghttp2-0:1.43.0-11.el7jbcs.src", "product_id": "jbcs-httpd24-nghttp2-0:1.43.0-11.el7jbcs.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-nghttp2@1.43.0-11.el7jbcs?arch=src" } } }, { "category": "product_version", "name": "jbcs-httpd24-openssl-1:1.1.1k-13.el7jbcs.src", "product": { "name": "jbcs-httpd24-openssl-1:1.1.1k-13.el7jbcs.src", "product_id": "jbcs-httpd24-openssl-1:1.1.1k-13.el7jbcs.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-openssl@1.1.1k-13.el7jbcs?arch=src\u0026epoch=1" } } }, { "category": "product_version", "name": "jbcs-httpd24-curl-0:7.86.0-2.el7jbcs.src", "product": { "name": "jbcs-httpd24-curl-0:7.86.0-2.el7jbcs.src", "product_id": "jbcs-httpd24-curl-0:7.86.0-2.el7jbcs.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-curl@7.86.0-2.el7jbcs?arch=src" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_md-1:2.4.0-18.el7jbcs.src", "product": { "name": "jbcs-httpd24-mod_md-1:2.4.0-18.el7jbcs.src", "product_id": "jbcs-httpd24-mod_md-1:2.4.0-18.el7jbcs.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_md@2.4.0-18.el7jbcs?arch=src\u0026epoch=1" } } }, { "category": "product_version", "name": "jbcs-httpd24-httpd-0:2.4.51-37.el7jbcs.src", "product": { "name": "jbcs-httpd24-httpd-0:2.4.51-37.el7jbcs.src", "product_id": "jbcs-httpd24-httpd-0:2.4.51-37.el7jbcs.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-httpd@2.4.51-37.el7jbcs?arch=src" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_http2-0:1.15.19-20.el7jbcs.src", "product": { "name": "jbcs-httpd24-mod_http2-0:1.15.19-20.el7jbcs.src", "product_id": "jbcs-httpd24-mod_http2-0:1.15.19-20.el7jbcs.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_http2@1.15.19-20.el7jbcs?arch=src" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_security-0:2.9.3-22.el7jbcs.src", "product": { "name": "jbcs-httpd24-mod_security-0:2.9.3-22.el7jbcs.src", "product_id": "jbcs-httpd24-mod_security-0:2.9.3-22.el7jbcs.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_security@2.9.3-22.el7jbcs?arch=src" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_jk-0:1.2.48-44.redhat_1.el7jbcs.src", "product": { "name": "jbcs-httpd24-mod_jk-0:1.2.48-44.redhat_1.el7jbcs.src", "product_id": "jbcs-httpd24-mod_jk-0:1.2.48-44.redhat_1.el7jbcs.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_jk@1.2.48-44.redhat_1.el7jbcs?arch=src" } } }, { "category": "product_version", "name": "jbcs-httpd24-apr-util-0:1.6.1-99.el7jbcs.src", "product": { "name": "jbcs-httpd24-apr-util-0:1.6.1-99.el7jbcs.src", "product_id": "jbcs-httpd24-apr-util-0:1.6.1-99.el7jbcs.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-apr-util@1.6.1-99.el7jbcs?arch=src" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_proxy_cluster-0:1.3.17-13.el7jbcs.src", "product": { "name": "jbcs-httpd24-mod_proxy_cluster-0:1.3.17-13.el7jbcs.src", "product_id": "jbcs-httpd24-mod_proxy_cluster-0:1.3.17-13.el7jbcs.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_proxy_cluster@1.3.17-13.el7jbcs?arch=src" } } }, { "category": "product_version", "name": "jbcs-httpd24-openssl-chil-0:1.0.0-17.el8jbcs.src", "product": { "name": "jbcs-httpd24-openssl-chil-0:1.0.0-17.el8jbcs.src", "product_id": "jbcs-httpd24-openssl-chil-0:1.0.0-17.el8jbcs.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-openssl-chil@1.0.0-17.el8jbcs?arch=src" } } }, { "category": "product_version", "name": "jbcs-httpd24-openssl-pkcs11-0:0.4.10-32.el8jbcs.src", "product": { "name": "jbcs-httpd24-openssl-pkcs11-0:0.4.10-32.el8jbcs.src", "product_id": "jbcs-httpd24-openssl-pkcs11-0:0.4.10-32.el8jbcs.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-openssl-pkcs11@0.4.10-32.el8jbcs?arch=src" } } }, { "category": "product_version", "name": "jbcs-httpd24-nghttp2-0:1.43.0-11.el8jbcs.src", "product": { "name": "jbcs-httpd24-nghttp2-0:1.43.0-11.el8jbcs.src", "product_id": "jbcs-httpd24-nghttp2-0:1.43.0-11.el8jbcs.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-nghttp2@1.43.0-11.el8jbcs?arch=src" } } }, { "category": "product_version", "name": "jbcs-httpd24-openssl-1:1.1.1k-13.el8jbcs.src", "product": { "name": "jbcs-httpd24-openssl-1:1.1.1k-13.el8jbcs.src", "product_id": "jbcs-httpd24-openssl-1:1.1.1k-13.el8jbcs.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-openssl@1.1.1k-13.el8jbcs?arch=src\u0026epoch=1" } } }, { "category": "product_version", "name": "jbcs-httpd24-curl-0:7.86.0-2.el8jbcs.src", "product": { "name": "jbcs-httpd24-curl-0:7.86.0-2.el8jbcs.src", "product_id": "jbcs-httpd24-curl-0:7.86.0-2.el8jbcs.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-curl@7.86.0-2.el8jbcs?arch=src" } } }, { "category": "product_version", "name": "jbcs-httpd24-httpd-0:2.4.51-37.el8jbcs.src", "product": { "name": "jbcs-httpd24-httpd-0:2.4.51-37.el8jbcs.src", "product_id": "jbcs-httpd24-httpd-0:2.4.51-37.el8jbcs.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-httpd@2.4.51-37.el8jbcs?arch=src" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_md-1:2.4.0-18.el8jbcs.src", "product": { "name": "jbcs-httpd24-mod_md-1:2.4.0-18.el8jbcs.src", "product_id": "jbcs-httpd24-mod_md-1:2.4.0-18.el8jbcs.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_md@2.4.0-18.el8jbcs?arch=src\u0026epoch=1" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_http2-0:1.15.19-20.el8jbcs.src", "product": { "name": "jbcs-httpd24-mod_http2-0:1.15.19-20.el8jbcs.src", "product_id": "jbcs-httpd24-mod_http2-0:1.15.19-20.el8jbcs.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_http2@1.15.19-20.el8jbcs?arch=src" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_security-0:2.9.3-22.el8jbcs.src", "product": { "name": "jbcs-httpd24-mod_security-0:2.9.3-22.el8jbcs.src", "product_id": "jbcs-httpd24-mod_security-0:2.9.3-22.el8jbcs.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_security@2.9.3-22.el8jbcs?arch=src" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_jk-0:1.2.48-44.redhat_1.el8jbcs.src", "product": { "name": "jbcs-httpd24-mod_jk-0:1.2.48-44.redhat_1.el8jbcs.src", "product_id": "jbcs-httpd24-mod_jk-0:1.2.48-44.redhat_1.el8jbcs.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_jk@1.2.48-44.redhat_1.el8jbcs?arch=src" } } }, { "category": "product_version", "name": "jbcs-httpd24-apr-util-0:1.6.1-99.el8jbcs.src", "product": { "name": "jbcs-httpd24-apr-util-0:1.6.1-99.el8jbcs.src", "product_id": "jbcs-httpd24-apr-util-0:1.6.1-99.el8jbcs.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-apr-util@1.6.1-99.el8jbcs?arch=src" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_proxy_cluster-0:1.3.17-13.el8jbcs.src", "product": { "name": "jbcs-httpd24-mod_proxy_cluster-0:1.3.17-13.el8jbcs.src", "product_id": "jbcs-httpd24-mod_proxy_cluster-0:1.3.17-13.el8jbcs.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_proxy_cluster@1.3.17-13.el8jbcs?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "jbcs-httpd24-openssl-pkcs11-0:0.4.10-32.el7jbcs.x86_64", "product": { "name": "jbcs-httpd24-openssl-pkcs11-0:0.4.10-32.el7jbcs.x86_64", "product_id": "jbcs-httpd24-openssl-pkcs11-0:0.4.10-32.el7jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-openssl-pkcs11@0.4.10-32.el7jbcs?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-32.el7jbcs.x86_64", "product": { "name": "jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-32.el7jbcs.x86_64", "product_id": "jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-32.el7jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-openssl-pkcs11-debuginfo@0.4.10-32.el7jbcs?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-openssl-chil-0:1.0.0-17.el7jbcs.x86_64", "product": { "name": "jbcs-httpd24-openssl-chil-0:1.0.0-17.el7jbcs.x86_64", "product_id": "jbcs-httpd24-openssl-chil-0:1.0.0-17.el7jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-openssl-chil@1.0.0-17.el7jbcs?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-17.el7jbcs.x86_64", "product": { "name": "jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-17.el7jbcs.x86_64", "product_id": "jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-17.el7jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-openssl-chil-debuginfo@1.0.0-17.el7jbcs?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-nghttp2-0:1.43.0-11.el7jbcs.x86_64", "product": { "name": "jbcs-httpd24-nghttp2-0:1.43.0-11.el7jbcs.x86_64", "product_id": "jbcs-httpd24-nghttp2-0:1.43.0-11.el7jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-nghttp2@1.43.0-11.el7jbcs?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-nghttp2-devel-0:1.43.0-11.el7jbcs.x86_64", "product": { "name": "jbcs-httpd24-nghttp2-devel-0:1.43.0-11.el7jbcs.x86_64", "product_id": "jbcs-httpd24-nghttp2-devel-0:1.43.0-11.el7jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-nghttp2-devel@1.43.0-11.el7jbcs?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-nghttp2-debuginfo-0:1.43.0-11.el7jbcs.x86_64", "product": { "name": "jbcs-httpd24-nghttp2-debuginfo-0:1.43.0-11.el7jbcs.x86_64", "product_id": "jbcs-httpd24-nghttp2-debuginfo-0:1.43.0-11.el7jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-nghttp2-debuginfo@1.43.0-11.el7jbcs?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-openssl-1:1.1.1k-13.el7jbcs.x86_64", "product": { "name": "jbcs-httpd24-openssl-1:1.1.1k-13.el7jbcs.x86_64", "product_id": "jbcs-httpd24-openssl-1:1.1.1k-13.el7jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-openssl@1.1.1k-13.el7jbcs?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "jbcs-httpd24-openssl-devel-1:1.1.1k-13.el7jbcs.x86_64", "product": { "name": "jbcs-httpd24-openssl-devel-1:1.1.1k-13.el7jbcs.x86_64", "product_id": "jbcs-httpd24-openssl-devel-1:1.1.1k-13.el7jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-openssl-devel@1.1.1k-13.el7jbcs?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "jbcs-httpd24-openssl-libs-1:1.1.1k-13.el7jbcs.x86_64", "product": { "name": "jbcs-httpd24-openssl-libs-1:1.1.1k-13.el7jbcs.x86_64", "product_id": "jbcs-httpd24-openssl-libs-1:1.1.1k-13.el7jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-openssl-libs@1.1.1k-13.el7jbcs?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "jbcs-httpd24-openssl-perl-1:1.1.1k-13.el7jbcs.x86_64", "product": { "name": "jbcs-httpd24-openssl-perl-1:1.1.1k-13.el7jbcs.x86_64", "product_id": "jbcs-httpd24-openssl-perl-1:1.1.1k-13.el7jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-openssl-perl@1.1.1k-13.el7jbcs?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "jbcs-httpd24-openssl-static-1:1.1.1k-13.el7jbcs.x86_64", "product": { "name": "jbcs-httpd24-openssl-static-1:1.1.1k-13.el7jbcs.x86_64", "product_id": "jbcs-httpd24-openssl-static-1:1.1.1k-13.el7jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-openssl-static@1.1.1k-13.el7jbcs?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "jbcs-httpd24-openssl-debuginfo-1:1.1.1k-13.el7jbcs.x86_64", "product": { "name": "jbcs-httpd24-openssl-debuginfo-1:1.1.1k-13.el7jbcs.x86_64", "product_id": "jbcs-httpd24-openssl-debuginfo-1:1.1.1k-13.el7jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-openssl-debuginfo@1.1.1k-13.el7jbcs?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "jbcs-httpd24-curl-0:7.86.0-2.el7jbcs.x86_64", "product": { "name": "jbcs-httpd24-curl-0:7.86.0-2.el7jbcs.x86_64", "product_id": "jbcs-httpd24-curl-0:7.86.0-2.el7jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-curl@7.86.0-2.el7jbcs?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-libcurl-0:7.86.0-2.el7jbcs.x86_64", "product": { "name": "jbcs-httpd24-libcurl-0:7.86.0-2.el7jbcs.x86_64", "product_id": "jbcs-httpd24-libcurl-0:7.86.0-2.el7jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-libcurl@7.86.0-2.el7jbcs?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-libcurl-devel-0:7.86.0-2.el7jbcs.x86_64", "product": { "name": "jbcs-httpd24-libcurl-devel-0:7.86.0-2.el7jbcs.x86_64", "product_id": "jbcs-httpd24-libcurl-devel-0:7.86.0-2.el7jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-libcurl-devel@7.86.0-2.el7jbcs?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-curl-debuginfo-0:7.86.0-2.el7jbcs.x86_64", "product": { "name": "jbcs-httpd24-curl-debuginfo-0:7.86.0-2.el7jbcs.x86_64", "product_id": "jbcs-httpd24-curl-debuginfo-0:7.86.0-2.el7jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-curl-debuginfo@7.86.0-2.el7jbcs?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_md-1:2.4.0-18.el7jbcs.x86_64", "product": { "name": "jbcs-httpd24-mod_md-1:2.4.0-18.el7jbcs.x86_64", "product_id": "jbcs-httpd24-mod_md-1:2.4.0-18.el7jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_md@2.4.0-18.el7jbcs?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_md-debuginfo-1:2.4.0-18.el7jbcs.x86_64", "product": { "name": "jbcs-httpd24-mod_md-debuginfo-1:2.4.0-18.el7jbcs.x86_64", "product_id": "jbcs-httpd24-mod_md-debuginfo-1:2.4.0-18.el7jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_md-debuginfo@2.4.0-18.el7jbcs?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "jbcs-httpd24-httpd-0:2.4.51-37.el7jbcs.x86_64", "product": { "name": "jbcs-httpd24-httpd-0:2.4.51-37.el7jbcs.x86_64", "product_id": "jbcs-httpd24-httpd-0:2.4.51-37.el7jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-httpd@2.4.51-37.el7jbcs?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-httpd-devel-0:2.4.51-37.el7jbcs.x86_64", "product": { "name": "jbcs-httpd24-httpd-devel-0:2.4.51-37.el7jbcs.x86_64", "product_id": "jbcs-httpd24-httpd-devel-0:2.4.51-37.el7jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-httpd-devel@2.4.51-37.el7jbcs?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-httpd-selinux-0:2.4.51-37.el7jbcs.x86_64", "product": { "name": "jbcs-httpd24-httpd-selinux-0:2.4.51-37.el7jbcs.x86_64", "product_id": "jbcs-httpd24-httpd-selinux-0:2.4.51-37.el7jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-httpd-selinux@2.4.51-37.el7jbcs?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-httpd-tools-0:2.4.51-37.el7jbcs.x86_64", "product": { "name": "jbcs-httpd24-httpd-tools-0:2.4.51-37.el7jbcs.x86_64", "product_id": "jbcs-httpd24-httpd-tools-0:2.4.51-37.el7jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-httpd-tools@2.4.51-37.el7jbcs?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_ldap-0:2.4.51-37.el7jbcs.x86_64", "product": { "name": "jbcs-httpd24-mod_ldap-0:2.4.51-37.el7jbcs.x86_64", "product_id": "jbcs-httpd24-mod_ldap-0:2.4.51-37.el7jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_ldap@2.4.51-37.el7jbcs?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_proxy_html-1:2.4.51-37.el7jbcs.x86_64", "product": { "name": "jbcs-httpd24-mod_proxy_html-1:2.4.51-37.el7jbcs.x86_64", "product_id": "jbcs-httpd24-mod_proxy_html-1:2.4.51-37.el7jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_proxy_html@2.4.51-37.el7jbcs?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_session-0:2.4.51-37.el7jbcs.x86_64", "product": { "name": "jbcs-httpd24-mod_session-0:2.4.51-37.el7jbcs.x86_64", "product_id": "jbcs-httpd24-mod_session-0:2.4.51-37.el7jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_session@2.4.51-37.el7jbcs?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_ssl-1:2.4.51-37.el7jbcs.x86_64", "product": { "name": "jbcs-httpd24-mod_ssl-1:2.4.51-37.el7jbcs.x86_64", "product_id": "jbcs-httpd24-mod_ssl-1:2.4.51-37.el7jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_ssl@2.4.51-37.el7jbcs?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "jbcs-httpd24-httpd-debuginfo-0:2.4.51-37.el7jbcs.x86_64", "product": { "name": "jbcs-httpd24-httpd-debuginfo-0:2.4.51-37.el7jbcs.x86_64", "product_id": "jbcs-httpd24-httpd-debuginfo-0:2.4.51-37.el7jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-httpd-debuginfo@2.4.51-37.el7jbcs?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_http2-0:1.15.19-20.el7jbcs.x86_64", "product": { "name": "jbcs-httpd24-mod_http2-0:1.15.19-20.el7jbcs.x86_64", "product_id": "jbcs-httpd24-mod_http2-0:1.15.19-20.el7jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_http2@1.15.19-20.el7jbcs?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_http2-debuginfo-0:1.15.19-20.el7jbcs.x86_64", "product": { "name": "jbcs-httpd24-mod_http2-debuginfo-0:1.15.19-20.el7jbcs.x86_64", "product_id": "jbcs-httpd24-mod_http2-debuginfo-0:1.15.19-20.el7jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_http2-debuginfo@1.15.19-20.el7jbcs?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_security-0:2.9.3-22.el7jbcs.x86_64", "product": { "name": "jbcs-httpd24-mod_security-0:2.9.3-22.el7jbcs.x86_64", "product_id": "jbcs-httpd24-mod_security-0:2.9.3-22.el7jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_security@2.9.3-22.el7jbcs?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_security-debuginfo-0:2.9.3-22.el7jbcs.x86_64", "product": { "name": "jbcs-httpd24-mod_security-debuginfo-0:2.9.3-22.el7jbcs.x86_64", "product_id": "jbcs-httpd24-mod_security-debuginfo-0:2.9.3-22.el7jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_security-debuginfo@2.9.3-22.el7jbcs?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_jk-ap24-0:1.2.48-44.redhat_1.el7jbcs.x86_64", "product": { "name": "jbcs-httpd24-mod_jk-ap24-0:1.2.48-44.redhat_1.el7jbcs.x86_64", "product_id": "jbcs-httpd24-mod_jk-ap24-0:1.2.48-44.redhat_1.el7jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_jk-ap24@1.2.48-44.redhat_1.el7jbcs?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-44.redhat_1.el7jbcs.x86_64", "product": { "name": "jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-44.redhat_1.el7jbcs.x86_64", "product_id": "jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-44.redhat_1.el7jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_jk-debuginfo@1.2.48-44.redhat_1.el7jbcs?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-apr-util-0:1.6.1-99.el7jbcs.x86_64", "product": { "name": "jbcs-httpd24-apr-util-0:1.6.1-99.el7jbcs.x86_64", "product_id": "jbcs-httpd24-apr-util-0:1.6.1-99.el7jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-apr-util@1.6.1-99.el7jbcs?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-apr-util-devel-0:1.6.1-99.el7jbcs.x86_64", "product": { "name": "jbcs-httpd24-apr-util-devel-0:1.6.1-99.el7jbcs.x86_64", "product_id": "jbcs-httpd24-apr-util-devel-0:1.6.1-99.el7jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-apr-util-devel@1.6.1-99.el7jbcs?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-apr-util-ldap-0:1.6.1-99.el7jbcs.x86_64", "product": { "name": "jbcs-httpd24-apr-util-ldap-0:1.6.1-99.el7jbcs.x86_64", "product_id": "jbcs-httpd24-apr-util-ldap-0:1.6.1-99.el7jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-apr-util-ldap@1.6.1-99.el7jbcs?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-apr-util-mysql-0:1.6.1-99.el7jbcs.x86_64", "product": { "name": "jbcs-httpd24-apr-util-mysql-0:1.6.1-99.el7jbcs.x86_64", "product_id": "jbcs-httpd24-apr-util-mysql-0:1.6.1-99.el7jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-apr-util-mysql@1.6.1-99.el7jbcs?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-apr-util-nss-0:1.6.1-99.el7jbcs.x86_64", "product": { "name": "jbcs-httpd24-apr-util-nss-0:1.6.1-99.el7jbcs.x86_64", "product_id": "jbcs-httpd24-apr-util-nss-0:1.6.1-99.el7jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-apr-util-nss@1.6.1-99.el7jbcs?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-apr-util-odbc-0:1.6.1-99.el7jbcs.x86_64", "product": { "name": "jbcs-httpd24-apr-util-odbc-0:1.6.1-99.el7jbcs.x86_64", "product_id": "jbcs-httpd24-apr-util-odbc-0:1.6.1-99.el7jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-apr-util-odbc@1.6.1-99.el7jbcs?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-apr-util-openssl-0:1.6.1-99.el7jbcs.x86_64", "product": { "name": "jbcs-httpd24-apr-util-openssl-0:1.6.1-99.el7jbcs.x86_64", "product_id": "jbcs-httpd24-apr-util-openssl-0:1.6.1-99.el7jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-apr-util-openssl@1.6.1-99.el7jbcs?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-apr-util-pgsql-0:1.6.1-99.el7jbcs.x86_64", "product": { "name": "jbcs-httpd24-apr-util-pgsql-0:1.6.1-99.el7jbcs.x86_64", "product_id": "jbcs-httpd24-apr-util-pgsql-0:1.6.1-99.el7jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-apr-util-pgsql@1.6.1-99.el7jbcs?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-apr-util-sqlite-0:1.6.1-99.el7jbcs.x86_64", "product": { "name": "jbcs-httpd24-apr-util-sqlite-0:1.6.1-99.el7jbcs.x86_64", "product_id": "jbcs-httpd24-apr-util-sqlite-0:1.6.1-99.el7jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-apr-util-sqlite@1.6.1-99.el7jbcs?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-apr-util-debuginfo-0:1.6.1-99.el7jbcs.x86_64", "product": { "name": "jbcs-httpd24-apr-util-debuginfo-0:1.6.1-99.el7jbcs.x86_64", "product_id": "jbcs-httpd24-apr-util-debuginfo-0:1.6.1-99.el7jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-apr-util-debuginfo@1.6.1-99.el7jbcs?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_proxy_cluster-0:1.3.17-13.el7jbcs.x86_64", "product": { "name": "jbcs-httpd24-mod_proxy_cluster-0:1.3.17-13.el7jbcs.x86_64", "product_id": "jbcs-httpd24-mod_proxy_cluster-0:1.3.17-13.el7jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_proxy_cluster@1.3.17-13.el7jbcs?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_proxy_cluster-debuginfo-0:1.3.17-13.el7jbcs.x86_64", "product": { "name": "jbcs-httpd24-mod_proxy_cluster-debuginfo-0:1.3.17-13.el7jbcs.x86_64", "product_id": "jbcs-httpd24-mod_proxy_cluster-debuginfo-0:1.3.17-13.el7jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_proxy_cluster-debuginfo@1.3.17-13.el7jbcs?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-openssl-chil-0:1.0.0-17.el8jbcs.x86_64", "product": { "name": "jbcs-httpd24-openssl-chil-0:1.0.0-17.el8jbcs.x86_64", "product_id": "jbcs-httpd24-openssl-chil-0:1.0.0-17.el8jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-openssl-chil@1.0.0-17.el8jbcs?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-17.el8jbcs.x86_64", "product": { "name": "jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-17.el8jbcs.x86_64", "product_id": "jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-17.el8jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-openssl-chil-debuginfo@1.0.0-17.el8jbcs?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-openssl-pkcs11-0:0.4.10-32.el8jbcs.x86_64", "product": { "name": "jbcs-httpd24-openssl-pkcs11-0:0.4.10-32.el8jbcs.x86_64", "product_id": "jbcs-httpd24-openssl-pkcs11-0:0.4.10-32.el8jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-openssl-pkcs11@0.4.10-32.el8jbcs?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-32.el8jbcs.x86_64", "product": { "name": "jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-32.el8jbcs.x86_64", "product_id": "jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-32.el8jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-openssl-pkcs11-debuginfo@0.4.10-32.el8jbcs?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-nghttp2-0:1.43.0-11.el8jbcs.x86_64", "product": { "name": "jbcs-httpd24-nghttp2-0:1.43.0-11.el8jbcs.x86_64", "product_id": "jbcs-httpd24-nghttp2-0:1.43.0-11.el8jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-nghttp2@1.43.0-11.el8jbcs?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-nghttp2-devel-0:1.43.0-11.el8jbcs.x86_64", "product": { "name": "jbcs-httpd24-nghttp2-devel-0:1.43.0-11.el8jbcs.x86_64", "product_id": "jbcs-httpd24-nghttp2-devel-0:1.43.0-11.el8jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-nghttp2-devel@1.43.0-11.el8jbcs?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-nghttp2-debuginfo-0:1.43.0-11.el8jbcs.x86_64", "product": { "name": "jbcs-httpd24-nghttp2-debuginfo-0:1.43.0-11.el8jbcs.x86_64", "product_id": "jbcs-httpd24-nghttp2-debuginfo-0:1.43.0-11.el8jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-nghttp2-debuginfo@1.43.0-11.el8jbcs?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-openssl-1:1.1.1k-13.el8jbcs.x86_64", "product": { "name": "jbcs-httpd24-openssl-1:1.1.1k-13.el8jbcs.x86_64", "product_id": "jbcs-httpd24-openssl-1:1.1.1k-13.el8jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-openssl@1.1.1k-13.el8jbcs?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "jbcs-httpd24-openssl-devel-1:1.1.1k-13.el8jbcs.x86_64", "product": { "name": "jbcs-httpd24-openssl-devel-1:1.1.1k-13.el8jbcs.x86_64", "product_id": "jbcs-httpd24-openssl-devel-1:1.1.1k-13.el8jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-openssl-devel@1.1.1k-13.el8jbcs?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "jbcs-httpd24-openssl-libs-1:1.1.1k-13.el8jbcs.x86_64", "product": { "name": "jbcs-httpd24-openssl-libs-1:1.1.1k-13.el8jbcs.x86_64", "product_id": "jbcs-httpd24-openssl-libs-1:1.1.1k-13.el8jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-openssl-libs@1.1.1k-13.el8jbcs?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "jbcs-httpd24-openssl-perl-1:1.1.1k-13.el8jbcs.x86_64", "product": { "name": "jbcs-httpd24-openssl-perl-1:1.1.1k-13.el8jbcs.x86_64", "product_id": "jbcs-httpd24-openssl-perl-1:1.1.1k-13.el8jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-openssl-perl@1.1.1k-13.el8jbcs?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "jbcs-httpd24-openssl-static-1:1.1.1k-13.el8jbcs.x86_64", "product": { "name": "jbcs-httpd24-openssl-static-1:1.1.1k-13.el8jbcs.x86_64", "product_id": "jbcs-httpd24-openssl-static-1:1.1.1k-13.el8jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-openssl-static@1.1.1k-13.el8jbcs?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "jbcs-httpd24-openssl-debuginfo-1:1.1.1k-13.el8jbcs.x86_64", "product": { "name": "jbcs-httpd24-openssl-debuginfo-1:1.1.1k-13.el8jbcs.x86_64", "product_id": "jbcs-httpd24-openssl-debuginfo-1:1.1.1k-13.el8jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-openssl-debuginfo@1.1.1k-13.el8jbcs?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "jbcs-httpd24-openssl-libs-debuginfo-1:1.1.1k-13.el8jbcs.x86_64", "product": { "name": "jbcs-httpd24-openssl-libs-debuginfo-1:1.1.1k-13.el8jbcs.x86_64", "product_id": "jbcs-httpd24-openssl-libs-debuginfo-1:1.1.1k-13.el8jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-openssl-libs-debuginfo@1.1.1k-13.el8jbcs?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "jbcs-httpd24-curl-0:7.86.0-2.el8jbcs.x86_64", "product": { "name": "jbcs-httpd24-curl-0:7.86.0-2.el8jbcs.x86_64", "product_id": "jbcs-httpd24-curl-0:7.86.0-2.el8jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-curl@7.86.0-2.el8jbcs?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-libcurl-0:7.86.0-2.el8jbcs.x86_64", "product": { "name": "jbcs-httpd24-libcurl-0:7.86.0-2.el8jbcs.x86_64", "product_id": "jbcs-httpd24-libcurl-0:7.86.0-2.el8jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-libcurl@7.86.0-2.el8jbcs?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-libcurl-devel-0:7.86.0-2.el8jbcs.x86_64", "product": { "name": "jbcs-httpd24-libcurl-devel-0:7.86.0-2.el8jbcs.x86_64", "product_id": "jbcs-httpd24-libcurl-devel-0:7.86.0-2.el8jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-libcurl-devel@7.86.0-2.el8jbcs?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-curl-debuginfo-0:7.86.0-2.el8jbcs.x86_64", "product": { "name": "jbcs-httpd24-curl-debuginfo-0:7.86.0-2.el8jbcs.x86_64", "product_id": "jbcs-httpd24-curl-debuginfo-0:7.86.0-2.el8jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-curl-debuginfo@7.86.0-2.el8jbcs?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-libcurl-debuginfo-0:7.86.0-2.el8jbcs.x86_64", "product": { "name": "jbcs-httpd24-libcurl-debuginfo-0:7.86.0-2.el8jbcs.x86_64", "product_id": "jbcs-httpd24-libcurl-debuginfo-0:7.86.0-2.el8jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-libcurl-debuginfo@7.86.0-2.el8jbcs?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-httpd-0:2.4.51-37.el8jbcs.x86_64", "product": { "name": "jbcs-httpd24-httpd-0:2.4.51-37.el8jbcs.x86_64", "product_id": "jbcs-httpd24-httpd-0:2.4.51-37.el8jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-httpd@2.4.51-37.el8jbcs?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-httpd-devel-0:2.4.51-37.el8jbcs.x86_64", "product": { "name": "jbcs-httpd24-httpd-devel-0:2.4.51-37.el8jbcs.x86_64", "product_id": "jbcs-httpd24-httpd-devel-0:2.4.51-37.el8jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-httpd-devel@2.4.51-37.el8jbcs?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-httpd-selinux-0:2.4.51-37.el8jbcs.x86_64", "product": { "name": "jbcs-httpd24-httpd-selinux-0:2.4.51-37.el8jbcs.x86_64", "product_id": "jbcs-httpd24-httpd-selinux-0:2.4.51-37.el8jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-httpd-selinux@2.4.51-37.el8jbcs?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-httpd-tools-0:2.4.51-37.el8jbcs.x86_64", "product": { "name": "jbcs-httpd24-httpd-tools-0:2.4.51-37.el8jbcs.x86_64", "product_id": "jbcs-httpd24-httpd-tools-0:2.4.51-37.el8jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-httpd-tools@2.4.51-37.el8jbcs?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_ldap-0:2.4.51-37.el8jbcs.x86_64", "product": { "name": "jbcs-httpd24-mod_ldap-0:2.4.51-37.el8jbcs.x86_64", "product_id": "jbcs-httpd24-mod_ldap-0:2.4.51-37.el8jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_ldap@2.4.51-37.el8jbcs?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_proxy_html-1:2.4.51-37.el8jbcs.x86_64", "product": { "name": "jbcs-httpd24-mod_proxy_html-1:2.4.51-37.el8jbcs.x86_64", "product_id": "jbcs-httpd24-mod_proxy_html-1:2.4.51-37.el8jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_proxy_html@2.4.51-37.el8jbcs?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_session-0:2.4.51-37.el8jbcs.x86_64", "product": { "name": "jbcs-httpd24-mod_session-0:2.4.51-37.el8jbcs.x86_64", "product_id": "jbcs-httpd24-mod_session-0:2.4.51-37.el8jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_session@2.4.51-37.el8jbcs?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_ssl-1:2.4.51-37.el8jbcs.x86_64", "product": { "name": "jbcs-httpd24-mod_ssl-1:2.4.51-37.el8jbcs.x86_64", "product_id": "jbcs-httpd24-mod_ssl-1:2.4.51-37.el8jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_ssl@2.4.51-37.el8jbcs?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "jbcs-httpd24-httpd-debuginfo-0:2.4.51-37.el8jbcs.x86_64", "product": { "name": "jbcs-httpd24-httpd-debuginfo-0:2.4.51-37.el8jbcs.x86_64", "product_id": "jbcs-httpd24-httpd-debuginfo-0:2.4.51-37.el8jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-httpd-debuginfo@2.4.51-37.el8jbcs?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-httpd-tools-debuginfo-0:2.4.51-37.el8jbcs.x86_64", "product": { "name": "jbcs-httpd24-httpd-tools-debuginfo-0:2.4.51-37.el8jbcs.x86_64", "product_id": "jbcs-httpd24-httpd-tools-debuginfo-0:2.4.51-37.el8jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-httpd-tools-debuginfo@2.4.51-37.el8jbcs?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_ldap-debuginfo-0:2.4.51-37.el8jbcs.x86_64", "product": { "name": "jbcs-httpd24-mod_ldap-debuginfo-0:2.4.51-37.el8jbcs.x86_64", "product_id": "jbcs-httpd24-mod_ldap-debuginfo-0:2.4.51-37.el8jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_ldap-debuginfo@2.4.51-37.el8jbcs?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_proxy_html-debuginfo-1:2.4.51-37.el8jbcs.x86_64", "product": { "name": "jbcs-httpd24-mod_proxy_html-debuginfo-1:2.4.51-37.el8jbcs.x86_64", "product_id": "jbcs-httpd24-mod_proxy_html-debuginfo-1:2.4.51-37.el8jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_proxy_html-debuginfo@2.4.51-37.el8jbcs?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_session-debuginfo-0:2.4.51-37.el8jbcs.x86_64", "product": { "name": "jbcs-httpd24-mod_session-debuginfo-0:2.4.51-37.el8jbcs.x86_64", "product_id": "jbcs-httpd24-mod_session-debuginfo-0:2.4.51-37.el8jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_session-debuginfo@2.4.51-37.el8jbcs?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_ssl-debuginfo-1:2.4.51-37.el8jbcs.x86_64", "product": { "name": "jbcs-httpd24-mod_ssl-debuginfo-1:2.4.51-37.el8jbcs.x86_64", "product_id": "jbcs-httpd24-mod_ssl-debuginfo-1:2.4.51-37.el8jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_ssl-debuginfo@2.4.51-37.el8jbcs?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_md-1:2.4.0-18.el8jbcs.x86_64", "product": { "name": "jbcs-httpd24-mod_md-1:2.4.0-18.el8jbcs.x86_64", "product_id": "jbcs-httpd24-mod_md-1:2.4.0-18.el8jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_md@2.4.0-18.el8jbcs?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_md-debuginfo-1:2.4.0-18.el8jbcs.x86_64", "product": { "name": "jbcs-httpd24-mod_md-debuginfo-1:2.4.0-18.el8jbcs.x86_64", "product_id": "jbcs-httpd24-mod_md-debuginfo-1:2.4.0-18.el8jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_md-debuginfo@2.4.0-18.el8jbcs?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_http2-0:1.15.19-20.el8jbcs.x86_64", "product": { "name": "jbcs-httpd24-mod_http2-0:1.15.19-20.el8jbcs.x86_64", "product_id": "jbcs-httpd24-mod_http2-0:1.15.19-20.el8jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_http2@1.15.19-20.el8jbcs?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_http2-debuginfo-0:1.15.19-20.el8jbcs.x86_64", "product": { "name": "jbcs-httpd24-mod_http2-debuginfo-0:1.15.19-20.el8jbcs.x86_64", "product_id": "jbcs-httpd24-mod_http2-debuginfo-0:1.15.19-20.el8jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_http2-debuginfo@1.15.19-20.el8jbcs?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_security-0:2.9.3-22.el8jbcs.x86_64", "product": { "name": "jbcs-httpd24-mod_security-0:2.9.3-22.el8jbcs.x86_64", "product_id": "jbcs-httpd24-mod_security-0:2.9.3-22.el8jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_security@2.9.3-22.el8jbcs?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_security-debuginfo-0:2.9.3-22.el8jbcs.x86_64", "product": { "name": "jbcs-httpd24-mod_security-debuginfo-0:2.9.3-22.el8jbcs.x86_64", "product_id": "jbcs-httpd24-mod_security-debuginfo-0:2.9.3-22.el8jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_security-debuginfo@2.9.3-22.el8jbcs?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_jk-ap24-0:1.2.48-44.redhat_1.el8jbcs.x86_64", "product": { "name": "jbcs-httpd24-mod_jk-ap24-0:1.2.48-44.redhat_1.el8jbcs.x86_64", "product_id": "jbcs-httpd24-mod_jk-ap24-0:1.2.48-44.redhat_1.el8jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_jk-ap24@1.2.48-44.redhat_1.el8jbcs?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_jk-ap24-debuginfo-0:1.2.48-44.redhat_1.el8jbcs.x86_64", "product": { "name": "jbcs-httpd24-mod_jk-ap24-debuginfo-0:1.2.48-44.redhat_1.el8jbcs.x86_64", "product_id": "jbcs-httpd24-mod_jk-ap24-debuginfo-0:1.2.48-44.redhat_1.el8jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_jk-ap24-debuginfo@1.2.48-44.redhat_1.el8jbcs?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-apr-util-0:1.6.1-99.el8jbcs.x86_64", "product": { "name": "jbcs-httpd24-apr-util-0:1.6.1-99.el8jbcs.x86_64", "product_id": "jbcs-httpd24-apr-util-0:1.6.1-99.el8jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-apr-util@1.6.1-99.el8jbcs?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-apr-util-devel-0:1.6.1-99.el8jbcs.x86_64", "product": { "name": "jbcs-httpd24-apr-util-devel-0:1.6.1-99.el8jbcs.x86_64", "product_id": "jbcs-httpd24-apr-util-devel-0:1.6.1-99.el8jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-apr-util-devel@1.6.1-99.el8jbcs?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-apr-util-ldap-0:1.6.1-99.el8jbcs.x86_64", "product": { "name": "jbcs-httpd24-apr-util-ldap-0:1.6.1-99.el8jbcs.x86_64", "product_id": "jbcs-httpd24-apr-util-ldap-0:1.6.1-99.el8jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-apr-util-ldap@1.6.1-99.el8jbcs?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-apr-util-mysql-0:1.6.1-99.el8jbcs.x86_64", "product": { "name": "jbcs-httpd24-apr-util-mysql-0:1.6.1-99.el8jbcs.x86_64", "product_id": "jbcs-httpd24-apr-util-mysql-0:1.6.1-99.el8jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-apr-util-mysql@1.6.1-99.el8jbcs?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-apr-util-nss-0:1.6.1-99.el8jbcs.x86_64", "product": { "name": "jbcs-httpd24-apr-util-nss-0:1.6.1-99.el8jbcs.x86_64", "product_id": "jbcs-httpd24-apr-util-nss-0:1.6.1-99.el8jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-apr-util-nss@1.6.1-99.el8jbcs?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-apr-util-odbc-0:1.6.1-99.el8jbcs.x86_64", "product": { "name": "jbcs-httpd24-apr-util-odbc-0:1.6.1-99.el8jbcs.x86_64", "product_id": "jbcs-httpd24-apr-util-odbc-0:1.6.1-99.el8jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-apr-util-odbc@1.6.1-99.el8jbcs?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-apr-util-openssl-0:1.6.1-99.el8jbcs.x86_64", "product": { "name": "jbcs-httpd24-apr-util-openssl-0:1.6.1-99.el8jbcs.x86_64", "product_id": "jbcs-httpd24-apr-util-openssl-0:1.6.1-99.el8jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-apr-util-openssl@1.6.1-99.el8jbcs?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-apr-util-pgsql-0:1.6.1-99.el8jbcs.x86_64", "product": { "name": "jbcs-httpd24-apr-util-pgsql-0:1.6.1-99.el8jbcs.x86_64", "product_id": "jbcs-httpd24-apr-util-pgsql-0:1.6.1-99.el8jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-apr-util-pgsql@1.6.1-99.el8jbcs?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-apr-util-sqlite-0:1.6.1-99.el8jbcs.x86_64", "product": { "name": "jbcs-httpd24-apr-util-sqlite-0:1.6.1-99.el8jbcs.x86_64", "product_id": "jbcs-httpd24-apr-util-sqlite-0:1.6.1-99.el8jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-apr-util-sqlite@1.6.1-99.el8jbcs?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-apr-util-debuginfo-0:1.6.1-99.el8jbcs.x86_64", "product": { "name": "jbcs-httpd24-apr-util-debuginfo-0:1.6.1-99.el8jbcs.x86_64", "product_id": "jbcs-httpd24-apr-util-debuginfo-0:1.6.1-99.el8jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-apr-util-debuginfo@1.6.1-99.el8jbcs?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-apr-util-ldap-debuginfo-0:1.6.1-99.el8jbcs.x86_64", "product": { "name": "jbcs-httpd24-apr-util-ldap-debuginfo-0:1.6.1-99.el8jbcs.x86_64", "product_id": "jbcs-httpd24-apr-util-ldap-debuginfo-0:1.6.1-99.el8jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-apr-util-ldap-debuginfo@1.6.1-99.el8jbcs?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-apr-util-mysql-debuginfo-0:1.6.1-99.el8jbcs.x86_64", "product": { "name": "jbcs-httpd24-apr-util-mysql-debuginfo-0:1.6.1-99.el8jbcs.x86_64", "product_id": "jbcs-httpd24-apr-util-mysql-debuginfo-0:1.6.1-99.el8jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-apr-util-mysql-debuginfo@1.6.1-99.el8jbcs?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-apr-util-nss-debuginfo-0:1.6.1-99.el8jbcs.x86_64", "product": { "name": "jbcs-httpd24-apr-util-nss-debuginfo-0:1.6.1-99.el8jbcs.x86_64", "product_id": "jbcs-httpd24-apr-util-nss-debuginfo-0:1.6.1-99.el8jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-apr-util-nss-debuginfo@1.6.1-99.el8jbcs?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-apr-util-odbc-debuginfo-0:1.6.1-99.el8jbcs.x86_64", "product": { "name": "jbcs-httpd24-apr-util-odbc-debuginfo-0:1.6.1-99.el8jbcs.x86_64", "product_id": "jbcs-httpd24-apr-util-odbc-debuginfo-0:1.6.1-99.el8jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-apr-util-odbc-debuginfo@1.6.1-99.el8jbcs?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-apr-util-openssl-debuginfo-0:1.6.1-99.el8jbcs.x86_64", "product": { "name": "jbcs-httpd24-apr-util-openssl-debuginfo-0:1.6.1-99.el8jbcs.x86_64", "product_id": "jbcs-httpd24-apr-util-openssl-debuginfo-0:1.6.1-99.el8jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-apr-util-openssl-debuginfo@1.6.1-99.el8jbcs?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-apr-util-pgsql-debuginfo-0:1.6.1-99.el8jbcs.x86_64", "product": { "name": "jbcs-httpd24-apr-util-pgsql-debuginfo-0:1.6.1-99.el8jbcs.x86_64", "product_id": "jbcs-httpd24-apr-util-pgsql-debuginfo-0:1.6.1-99.el8jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-apr-util-pgsql-debuginfo@1.6.1-99.el8jbcs?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-apr-util-sqlite-debuginfo-0:1.6.1-99.el8jbcs.x86_64", "product": { "name": "jbcs-httpd24-apr-util-sqlite-debuginfo-0:1.6.1-99.el8jbcs.x86_64", "product_id": "jbcs-httpd24-apr-util-sqlite-debuginfo-0:1.6.1-99.el8jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-apr-util-sqlite-debuginfo@1.6.1-99.el8jbcs?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_proxy_cluster-0:1.3.17-13.el8jbcs.x86_64", "product": { "name": "jbcs-httpd24-mod_proxy_cluster-0:1.3.17-13.el8jbcs.x86_64", "product_id": "jbcs-httpd24-mod_proxy_cluster-0:1.3.17-13.el8jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_proxy_cluster@1.3.17-13.el8jbcs?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_proxy_cluster-debuginfo-0:1.3.17-13.el8jbcs.x86_64", "product": { "name": "jbcs-httpd24-mod_proxy_cluster-debuginfo-0:1.3.17-13.el8jbcs.x86_64", "product_id": "jbcs-httpd24-mod_proxy_cluster-debuginfo-0:1.3.17-13.el8jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_proxy_cluster-debuginfo@1.3.17-13.el8jbcs?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "jbcs-httpd24-httpd-manual-0:2.4.51-37.el7jbcs.noarch", "product": { "name": "jbcs-httpd24-httpd-manual-0:2.4.51-37.el7jbcs.noarch", "product_id": "jbcs-httpd24-httpd-manual-0:2.4.51-37.el7jbcs.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-httpd-manual@2.4.51-37.el7jbcs?arch=noarch" } } }, { "category": "product_version", "name": "jbcs-httpd24-httpd-manual-0:2.4.51-37.el8jbcs.noarch", "product": { "name": "jbcs-httpd24-httpd-manual-0:2.4.51-37.el8jbcs.noarch", "product_id": "jbcs-httpd24-httpd-manual-0:2.4.51-37.el8jbcs.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-httpd-manual@2.4.51-37.el8jbcs?arch=noarch" } } } ], "category": "architecture", "name": "noarch" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-apr-util-0:1.6.1-99.el7jbcs.src as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-99.el7jbcs.src" }, "product_reference": "jbcs-httpd24-apr-util-0:1.6.1-99.el7jbcs.src", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-apr-util-0:1.6.1-99.el7jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-99.el7jbcs.x86_64" }, "product_reference": "jbcs-httpd24-apr-util-0:1.6.1-99.el7jbcs.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-apr-util-debuginfo-0:1.6.1-99.el7jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-99.el7jbcs.x86_64" }, "product_reference": "jbcs-httpd24-apr-util-debuginfo-0:1.6.1-99.el7jbcs.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-apr-util-devel-0:1.6.1-99.el7jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-99.el7jbcs.x86_64" }, "product_reference": "jbcs-httpd24-apr-util-devel-0:1.6.1-99.el7jbcs.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-apr-util-ldap-0:1.6.1-99.el7jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-99.el7jbcs.x86_64" }, "product_reference": "jbcs-httpd24-apr-util-ldap-0:1.6.1-99.el7jbcs.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-apr-util-mysql-0:1.6.1-99.el7jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-99.el7jbcs.x86_64" }, "product_reference": "jbcs-httpd24-apr-util-mysql-0:1.6.1-99.el7jbcs.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-apr-util-nss-0:1.6.1-99.el7jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-99.el7jbcs.x86_64" }, "product_reference": "jbcs-httpd24-apr-util-nss-0:1.6.1-99.el7jbcs.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-apr-util-odbc-0:1.6.1-99.el7jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-99.el7jbcs.x86_64" }, "product_reference": "jbcs-httpd24-apr-util-odbc-0:1.6.1-99.el7jbcs.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-apr-util-openssl-0:1.6.1-99.el7jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-99.el7jbcs.x86_64" }, "product_reference": "jbcs-httpd24-apr-util-openssl-0:1.6.1-99.el7jbcs.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-apr-util-pgsql-0:1.6.1-99.el7jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-99.el7jbcs.x86_64" }, "product_reference": "jbcs-httpd24-apr-util-pgsql-0:1.6.1-99.el7jbcs.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-apr-util-sqlite-0:1.6.1-99.el7jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-99.el7jbcs.x86_64" }, "product_reference": "jbcs-httpd24-apr-util-sqlite-0:1.6.1-99.el7jbcs.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-curl-0:7.86.0-2.el7jbcs.src as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-curl-0:7.86.0-2.el7jbcs.src" }, "product_reference": "jbcs-httpd24-curl-0:7.86.0-2.el7jbcs.src", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-curl-0:7.86.0-2.el7jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-curl-0:7.86.0-2.el7jbcs.x86_64" }, "product_reference": "jbcs-httpd24-curl-0:7.86.0-2.el7jbcs.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-curl-debuginfo-0:7.86.0-2.el7jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.86.0-2.el7jbcs.x86_64" }, "product_reference": "jbcs-httpd24-curl-debuginfo-0:7.86.0-2.el7jbcs.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-httpd-0:2.4.51-37.el7jbcs.src as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.51-37.el7jbcs.src" }, "product_reference": "jbcs-httpd24-httpd-0:2.4.51-37.el7jbcs.src", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-httpd-0:2.4.51-37.el7jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.51-37.el7jbcs.x86_64" }, "product_reference": "jbcs-httpd24-httpd-0:2.4.51-37.el7jbcs.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-httpd-debuginfo-0:2.4.51-37.el7jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.51-37.el7jbcs.x86_64" }, "product_reference": "jbcs-httpd24-httpd-debuginfo-0:2.4.51-37.el7jbcs.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-httpd-devel-0:2.4.51-37.el7jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.51-37.el7jbcs.x86_64" }, "product_reference": "jbcs-httpd24-httpd-devel-0:2.4.51-37.el7jbcs.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-httpd-manual-0:2.4.51-37.el7jbcs.noarch as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.51-37.el7jbcs.noarch" }, "product_reference": "jbcs-httpd24-httpd-manual-0:2.4.51-37.el7jbcs.noarch", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-httpd-selinux-0:2.4.51-37.el7jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.51-37.el7jbcs.x86_64" }, "product_reference": "jbcs-httpd24-httpd-selinux-0:2.4.51-37.el7jbcs.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-httpd-tools-0:2.4.51-37.el7jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.51-37.el7jbcs.x86_64" }, "product_reference": "jbcs-httpd24-httpd-tools-0:2.4.51-37.el7jbcs.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-libcurl-0:7.86.0-2.el7jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-libcurl-0:7.86.0-2.el7jbcs.x86_64" }, "product_reference": "jbcs-httpd24-libcurl-0:7.86.0-2.el7jbcs.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-libcurl-devel-0:7.86.0-2.el7jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.86.0-2.el7jbcs.x86_64" }, "product_reference": "jbcs-httpd24-libcurl-devel-0:7.86.0-2.el7jbcs.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_http2-0:1.15.19-20.el7jbcs.src as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-20.el7jbcs.src" }, "product_reference": "jbcs-httpd24-mod_http2-0:1.15.19-20.el7jbcs.src", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_http2-0:1.15.19-20.el7jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-20.el7jbcs.x86_64" }, "product_reference": "jbcs-httpd24-mod_http2-0:1.15.19-20.el7jbcs.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_http2-debuginfo-0:1.15.19-20.el7jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.19-20.el7jbcs.x86_64" }, "product_reference": "jbcs-httpd24-mod_http2-debuginfo-0:1.15.19-20.el7jbcs.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_jk-0:1.2.48-44.redhat_1.el7jbcs.src as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-44.redhat_1.el7jbcs.src" }, "product_reference": "jbcs-httpd24-mod_jk-0:1.2.48-44.redhat_1.el7jbcs.src", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_jk-ap24-0:1.2.48-44.redhat_1.el7jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-44.redhat_1.el7jbcs.x86_64" }, "product_reference": "jbcs-httpd24-mod_jk-ap24-0:1.2.48-44.redhat_1.el7jbcs.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-44.redhat_1.el7jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-44.redhat_1.el7jbcs.x86_64" }, "product_reference": "jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-44.redhat_1.el7jbcs.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_ldap-0:2.4.51-37.el7jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.51-37.el7jbcs.x86_64" }, "product_reference": "jbcs-httpd24-mod_ldap-0:2.4.51-37.el7jbcs.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_md-1:2.4.0-18.el7jbcs.src as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-mod_md-1:2.4.0-18.el7jbcs.src" }, "product_reference": "jbcs-httpd24-mod_md-1:2.4.0-18.el7jbcs.src", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_md-1:2.4.0-18.el7jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-mod_md-1:2.4.0-18.el7jbcs.x86_64" }, "product_reference": "jbcs-httpd24-mod_md-1:2.4.0-18.el7jbcs.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_md-debuginfo-1:2.4.0-18.el7jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.4.0-18.el7jbcs.x86_64" }, "product_reference": "jbcs-httpd24-mod_md-debuginfo-1:2.4.0-18.el7jbcs.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_proxy_cluster-0:1.3.17-13.el7jbcs.src as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.17-13.el7jbcs.src" }, "product_reference": "jbcs-httpd24-mod_proxy_cluster-0:1.3.17-13.el7jbcs.src", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_proxy_cluster-0:1.3.17-13.el7jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.17-13.el7jbcs.x86_64" }, "product_reference": "jbcs-httpd24-mod_proxy_cluster-0:1.3.17-13.el7jbcs.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_proxy_cluster-debuginfo-0:1.3.17-13.el7jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-debuginfo-0:1.3.17-13.el7jbcs.x86_64" }, "product_reference": "jbcs-httpd24-mod_proxy_cluster-debuginfo-0:1.3.17-13.el7jbcs.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_proxy_html-1:2.4.51-37.el7jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.51-37.el7jbcs.x86_64" }, "product_reference": "jbcs-httpd24-mod_proxy_html-1:2.4.51-37.el7jbcs.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_security-0:2.9.3-22.el7jbcs.src as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.3-22.el7jbcs.src" }, "product_reference": "jbcs-httpd24-mod_security-0:2.9.3-22.el7jbcs.src", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_security-0:2.9.3-22.el7jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.3-22.el7jbcs.x86_64" }, "product_reference": "jbcs-httpd24-mod_security-0:2.9.3-22.el7jbcs.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_security-debuginfo-0:2.9.3-22.el7jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.3-22.el7jbcs.x86_64" }, "product_reference": "jbcs-httpd24-mod_security-debuginfo-0:2.9.3-22.el7jbcs.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_session-0:2.4.51-37.el7jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.51-37.el7jbcs.x86_64" }, "product_reference": "jbcs-httpd24-mod_session-0:2.4.51-37.el7jbcs.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_ssl-1:2.4.51-37.el7jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.51-37.el7jbcs.x86_64" }, "product_reference": "jbcs-httpd24-mod_ssl-1:2.4.51-37.el7jbcs.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-nghttp2-0:1.43.0-11.el7jbcs.src as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.43.0-11.el7jbcs.src" }, "product_reference": "jbcs-httpd24-nghttp2-0:1.43.0-11.el7jbcs.src", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-nghttp2-0:1.43.0-11.el7jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.43.0-11.el7jbcs.x86_64" }, "product_reference": "jbcs-httpd24-nghttp2-0:1.43.0-11.el7jbcs.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-nghttp2-debuginfo-0:1.43.0-11.el7jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.43.0-11.el7jbcs.x86_64" }, "product_reference": "jbcs-httpd24-nghttp2-debuginfo-0:1.43.0-11.el7jbcs.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-nghttp2-devel-0:1.43.0-11.el7jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.43.0-11.el7jbcs.x86_64" }, "product_reference": "jbcs-httpd24-nghttp2-devel-0:1.43.0-11.el7jbcs.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-openssl-1:1.1.1k-13.el7jbcs.src as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1k-13.el7jbcs.src" }, "product_reference": "jbcs-httpd24-openssl-1:1.1.1k-13.el7jbcs.src", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-openssl-1:1.1.1k-13.el7jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1k-13.el7jbcs.x86_64" }, "product_reference": "jbcs-httpd24-openssl-1:1.1.1k-13.el7jbcs.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-openssl-chil-0:1.0.0-17.el7jbcs.src as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-17.el7jbcs.src" }, "product_reference": "jbcs-httpd24-openssl-chil-0:1.0.0-17.el7jbcs.src", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-openssl-chil-0:1.0.0-17.el7jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-17.el7jbcs.x86_64" }, "product_reference": "jbcs-httpd24-openssl-chil-0:1.0.0-17.el7jbcs.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-17.el7jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-17.el7jbcs.x86_64" }, "product_reference": "jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-17.el7jbcs.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-openssl-debuginfo-1:1.1.1k-13.el7jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1k-13.el7jbcs.x86_64" }, "product_reference": "jbcs-httpd24-openssl-debuginfo-1:1.1.1k-13.el7jbcs.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-openssl-devel-1:1.1.1k-13.el7jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1k-13.el7jbcs.x86_64" }, "product_reference": "jbcs-httpd24-openssl-devel-1:1.1.1k-13.el7jbcs.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-openssl-libs-1:1.1.1k-13.el7jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1k-13.el7jbcs.x86_64" }, "product_reference": "jbcs-httpd24-openssl-libs-1:1.1.1k-13.el7jbcs.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-openssl-perl-1:1.1.1k-13.el7jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1k-13.el7jbcs.x86_64" }, "product_reference": "jbcs-httpd24-openssl-perl-1:1.1.1k-13.el7jbcs.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-openssl-pkcs11-0:0.4.10-32.el7jbcs.src as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-32.el7jbcs.src" }, "product_reference": "jbcs-httpd24-openssl-pkcs11-0:0.4.10-32.el7jbcs.src", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-openssl-pkcs11-0:0.4.10-32.el7jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-32.el7jbcs.x86_64" }, "product_reference": "jbcs-httpd24-openssl-pkcs11-0:0.4.10-32.el7jbcs.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-32.el7jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-32.el7jbcs.x86_64" }, "product_reference": "jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-32.el7jbcs.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-openssl-static-1:1.1.1k-13.el7jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-openssl-static-1:1.1.1k-13.el7jbcs.x86_64" }, "product_reference": "jbcs-httpd24-openssl-static-1:1.1.1k-13.el7jbcs.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-apr-util-0:1.6.1-99.el8jbcs.src as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.1-99.el8jbcs.src" }, "product_reference": "jbcs-httpd24-apr-util-0:1.6.1-99.el8jbcs.src", "relates_to_product_reference": "8Base-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-apr-util-0:1.6.1-99.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.1-99.el8jbcs.x86_64" }, "product_reference": "jbcs-httpd24-apr-util-0:1.6.1-99.el8jbcs.x86_64", "relates_to_product_reference": "8Base-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-apr-util-debuginfo-0:1.6.1-99.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-99.el8jbcs.x86_64" }, "product_reference": "jbcs-httpd24-apr-util-debuginfo-0:1.6.1-99.el8jbcs.x86_64", "relates_to_product_reference": "8Base-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-apr-util-devel-0:1.6.1-99.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-99.el8jbcs.x86_64" }, "product_reference": "jbcs-httpd24-apr-util-devel-0:1.6.1-99.el8jbcs.x86_64", "relates_to_product_reference": "8Base-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-apr-util-ldap-0:1.6.1-99.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-99.el8jbcs.x86_64" }, "product_reference": "jbcs-httpd24-apr-util-ldap-0:1.6.1-99.el8jbcs.x86_64", "relates_to_product_reference": "8Base-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-apr-util-ldap-debuginfo-0:1.6.1-99.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-apr-util-ldap-debuginfo-0:1.6.1-99.el8jbcs.x86_64" }, "product_reference": "jbcs-httpd24-apr-util-ldap-debuginfo-0:1.6.1-99.el8jbcs.x86_64", "relates_to_product_reference": "8Base-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-apr-util-mysql-0:1.6.1-99.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-99.el8jbcs.x86_64" }, "product_reference": "jbcs-httpd24-apr-util-mysql-0:1.6.1-99.el8jbcs.x86_64", "relates_to_product_reference": "8Base-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-apr-util-mysql-debuginfo-0:1.6.1-99.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-apr-util-mysql-debuginfo-0:1.6.1-99.el8jbcs.x86_64" }, "product_reference": "jbcs-httpd24-apr-util-mysql-debuginfo-0:1.6.1-99.el8jbcs.x86_64", "relates_to_product_reference": "8Base-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-apr-util-nss-0:1.6.1-99.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-99.el8jbcs.x86_64" }, "product_reference": "jbcs-httpd24-apr-util-nss-0:1.6.1-99.el8jbcs.x86_64", "relates_to_product_reference": "8Base-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-apr-util-nss-debuginfo-0:1.6.1-99.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-apr-util-nss-debuginfo-0:1.6.1-99.el8jbcs.x86_64" }, "product_reference": "jbcs-httpd24-apr-util-nss-debuginfo-0:1.6.1-99.el8jbcs.x86_64", "relates_to_product_reference": "8Base-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-apr-util-odbc-0:1.6.1-99.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-99.el8jbcs.x86_64" }, "product_reference": "jbcs-httpd24-apr-util-odbc-0:1.6.1-99.el8jbcs.x86_64", "relates_to_product_reference": "8Base-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-apr-util-odbc-debuginfo-0:1.6.1-99.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-apr-util-odbc-debuginfo-0:1.6.1-99.el8jbcs.x86_64" }, "product_reference": "jbcs-httpd24-apr-util-odbc-debuginfo-0:1.6.1-99.el8jbcs.x86_64", "relates_to_product_reference": "8Base-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-apr-util-openssl-0:1.6.1-99.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-99.el8jbcs.x86_64" }, "product_reference": "jbcs-httpd24-apr-util-openssl-0:1.6.1-99.el8jbcs.x86_64", "relates_to_product_reference": "8Base-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-apr-util-openssl-debuginfo-0:1.6.1-99.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-apr-util-openssl-debuginfo-0:1.6.1-99.el8jbcs.x86_64" }, "product_reference": "jbcs-httpd24-apr-util-openssl-debuginfo-0:1.6.1-99.el8jbcs.x86_64", "relates_to_product_reference": "8Base-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-apr-util-pgsql-0:1.6.1-99.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-99.el8jbcs.x86_64" }, "product_reference": "jbcs-httpd24-apr-util-pgsql-0:1.6.1-99.el8jbcs.x86_64", "relates_to_product_reference": "8Base-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-apr-util-pgsql-debuginfo-0:1.6.1-99.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-apr-util-pgsql-debuginfo-0:1.6.1-99.el8jbcs.x86_64" }, "product_reference": "jbcs-httpd24-apr-util-pgsql-debuginfo-0:1.6.1-99.el8jbcs.x86_64", "relates_to_product_reference": "8Base-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-apr-util-sqlite-0:1.6.1-99.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-99.el8jbcs.x86_64" }, "product_reference": "jbcs-httpd24-apr-util-sqlite-0:1.6.1-99.el8jbcs.x86_64", "relates_to_product_reference": "8Base-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-apr-util-sqlite-debuginfo-0:1.6.1-99.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-apr-util-sqlite-debuginfo-0:1.6.1-99.el8jbcs.x86_64" }, "product_reference": "jbcs-httpd24-apr-util-sqlite-debuginfo-0:1.6.1-99.el8jbcs.x86_64", "relates_to_product_reference": "8Base-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-curl-0:7.86.0-2.el8jbcs.src as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-curl-0:7.86.0-2.el8jbcs.src" }, "product_reference": "jbcs-httpd24-curl-0:7.86.0-2.el8jbcs.src", "relates_to_product_reference": "8Base-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-curl-0:7.86.0-2.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-curl-0:7.86.0-2.el8jbcs.x86_64" }, "product_reference": "jbcs-httpd24-curl-0:7.86.0-2.el8jbcs.x86_64", "relates_to_product_reference": "8Base-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-curl-debuginfo-0:7.86.0-2.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-curl-debuginfo-0:7.86.0-2.el8jbcs.x86_64" }, "product_reference": "jbcs-httpd24-curl-debuginfo-0:7.86.0-2.el8jbcs.x86_64", "relates_to_product_reference": "8Base-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-httpd-0:2.4.51-37.el8jbcs.src as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.51-37.el8jbcs.src" }, "product_reference": "jbcs-httpd24-httpd-0:2.4.51-37.el8jbcs.src", "relates_to_product_reference": "8Base-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-httpd-0:2.4.51-37.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.51-37.el8jbcs.x86_64" }, "product_reference": "jbcs-httpd24-httpd-0:2.4.51-37.el8jbcs.x86_64", "relates_to_product_reference": "8Base-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-httpd-debuginfo-0:2.4.51-37.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.51-37.el8jbcs.x86_64" }, "product_reference": "jbcs-httpd24-httpd-debuginfo-0:2.4.51-37.el8jbcs.x86_64", "relates_to_product_reference": "8Base-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-httpd-devel-0:2.4.51-37.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-httpd-devel-0:2.4.51-37.el8jbcs.x86_64" }, "product_reference": "jbcs-httpd24-httpd-devel-0:2.4.51-37.el8jbcs.x86_64", "relates_to_product_reference": "8Base-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-httpd-manual-0:2.4.51-37.el8jbcs.noarch as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-httpd-manual-0:2.4.51-37.el8jbcs.noarch" }, "product_reference": "jbcs-httpd24-httpd-manual-0:2.4.51-37.el8jbcs.noarch", "relates_to_product_reference": "8Base-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-httpd-selinux-0:2.4.51-37.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.51-37.el8jbcs.x86_64" }, "product_reference": "jbcs-httpd24-httpd-selinux-0:2.4.51-37.el8jbcs.x86_64", "relates_to_product_reference": "8Base-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-httpd-tools-0:2.4.51-37.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-httpd-tools-0:2.4.51-37.el8jbcs.x86_64" }, "product_reference": "jbcs-httpd24-httpd-tools-0:2.4.51-37.el8jbcs.x86_64", "relates_to_product_reference": "8Base-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-httpd-tools-debuginfo-0:2.4.51-37.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-httpd-tools-debuginfo-0:2.4.51-37.el8jbcs.x86_64" }, "product_reference": "jbcs-httpd24-httpd-tools-debuginfo-0:2.4.51-37.el8jbcs.x86_64", "relates_to_product_reference": "8Base-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-libcurl-0:7.86.0-2.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-libcurl-0:7.86.0-2.el8jbcs.x86_64" }, "product_reference": "jbcs-httpd24-libcurl-0:7.86.0-2.el8jbcs.x86_64", "relates_to_product_reference": "8Base-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-libcurl-debuginfo-0:7.86.0-2.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-libcurl-debuginfo-0:7.86.0-2.el8jbcs.x86_64" }, "product_reference": "jbcs-httpd24-libcurl-debuginfo-0:7.86.0-2.el8jbcs.x86_64", "relates_to_product_reference": "8Base-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-libcurl-devel-0:7.86.0-2.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-libcurl-devel-0:7.86.0-2.el8jbcs.x86_64" }, "product_reference": "jbcs-httpd24-libcurl-devel-0:7.86.0-2.el8jbcs.x86_64", "relates_to_product_reference": "8Base-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_http2-0:1.15.19-20.el8jbcs.src as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-20.el8jbcs.src" }, "product_reference": "jbcs-httpd24-mod_http2-0:1.15.19-20.el8jbcs.src", "relates_to_product_reference": "8Base-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_http2-0:1.15.19-20.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-20.el8jbcs.x86_64" }, "product_reference": "jbcs-httpd24-mod_http2-0:1.15.19-20.el8jbcs.x86_64", "relates_to_product_reference": "8Base-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_http2-debuginfo-0:1.15.19-20.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.19-20.el8jbcs.x86_64" }, "product_reference": "jbcs-httpd24-mod_http2-debuginfo-0:1.15.19-20.el8jbcs.x86_64", "relates_to_product_reference": "8Base-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_jk-0:1.2.48-44.redhat_1.el8jbcs.src as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-44.redhat_1.el8jbcs.src" }, "product_reference": "jbcs-httpd24-mod_jk-0:1.2.48-44.redhat_1.el8jbcs.src", "relates_to_product_reference": "8Base-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_jk-ap24-0:1.2.48-44.redhat_1.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-44.redhat_1.el8jbcs.x86_64" }, "product_reference": "jbcs-httpd24-mod_jk-ap24-0:1.2.48-44.redhat_1.el8jbcs.x86_64", "relates_to_product_reference": "8Base-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_jk-ap24-debuginfo-0:1.2.48-44.redhat_1.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-debuginfo-0:1.2.48-44.redhat_1.el8jbcs.x86_64" }, "product_reference": "jbcs-httpd24-mod_jk-ap24-debuginfo-0:1.2.48-44.redhat_1.el8jbcs.x86_64", "relates_to_product_reference": "8Base-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_ldap-0:2.4.51-37.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-mod_ldap-0:2.4.51-37.el8jbcs.x86_64" }, "product_reference": "jbcs-httpd24-mod_ldap-0:2.4.51-37.el8jbcs.x86_64", "relates_to_product_reference": "8Base-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_ldap-debuginfo-0:2.4.51-37.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-mod_ldap-debuginfo-0:2.4.51-37.el8jbcs.x86_64" }, "product_reference": "jbcs-httpd24-mod_ldap-debuginfo-0:2.4.51-37.el8jbcs.x86_64", "relates_to_product_reference": "8Base-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_md-1:2.4.0-18.el8jbcs.src as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-mod_md-1:2.4.0-18.el8jbcs.src" }, "product_reference": "jbcs-httpd24-mod_md-1:2.4.0-18.el8jbcs.src", "relates_to_product_reference": "8Base-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_md-1:2.4.0-18.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-mod_md-1:2.4.0-18.el8jbcs.x86_64" }, "product_reference": "jbcs-httpd24-mod_md-1:2.4.0-18.el8jbcs.x86_64", "relates_to_product_reference": "8Base-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_md-debuginfo-1:2.4.0-18.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.4.0-18.el8jbcs.x86_64" }, "product_reference": "jbcs-httpd24-mod_md-debuginfo-1:2.4.0-18.el8jbcs.x86_64", "relates_to_product_reference": "8Base-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_proxy_cluster-0:1.3.17-13.el8jbcs.src as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.17-13.el8jbcs.src" }, "product_reference": "jbcs-httpd24-mod_proxy_cluster-0:1.3.17-13.el8jbcs.src", "relates_to_product_reference": "8Base-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_proxy_cluster-0:1.3.17-13.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.17-13.el8jbcs.x86_64" }, "product_reference": "jbcs-httpd24-mod_proxy_cluster-0:1.3.17-13.el8jbcs.x86_64", "relates_to_product_reference": "8Base-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_proxy_cluster-debuginfo-0:1.3.17-13.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-debuginfo-0:1.3.17-13.el8jbcs.x86_64" }, "product_reference": "jbcs-httpd24-mod_proxy_cluster-debuginfo-0:1.3.17-13.el8jbcs.x86_64", "relates_to_product_reference": "8Base-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_proxy_html-1:2.4.51-37.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.51-37.el8jbcs.x86_64" }, "product_reference": "jbcs-httpd24-mod_proxy_html-1:2.4.51-37.el8jbcs.x86_64", "relates_to_product_reference": "8Base-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_proxy_html-debuginfo-1:2.4.51-37.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-mod_proxy_html-debuginfo-1:2.4.51-37.el8jbcs.x86_64" }, "product_reference": "jbcs-httpd24-mod_proxy_html-debuginfo-1:2.4.51-37.el8jbcs.x86_64", "relates_to_product_reference": "8Base-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_security-0:2.9.3-22.el8jbcs.src as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.3-22.el8jbcs.src" }, "product_reference": "jbcs-httpd24-mod_security-0:2.9.3-22.el8jbcs.src", "relates_to_product_reference": "8Base-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_security-0:2.9.3-22.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.3-22.el8jbcs.x86_64" }, "product_reference": "jbcs-httpd24-mod_security-0:2.9.3-22.el8jbcs.x86_64", "relates_to_product_reference": "8Base-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_security-debuginfo-0:2.9.3-22.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.3-22.el8jbcs.x86_64" }, "product_reference": "jbcs-httpd24-mod_security-debuginfo-0:2.9.3-22.el8jbcs.x86_64", "relates_to_product_reference": "8Base-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_session-0:2.4.51-37.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-mod_session-0:2.4.51-37.el8jbcs.x86_64" }, "product_reference": "jbcs-httpd24-mod_session-0:2.4.51-37.el8jbcs.x86_64", "relates_to_product_reference": "8Base-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_session-debuginfo-0:2.4.51-37.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-mod_session-debuginfo-0:2.4.51-37.el8jbcs.x86_64" }, "product_reference": "jbcs-httpd24-mod_session-debuginfo-0:2.4.51-37.el8jbcs.x86_64", "relates_to_product_reference": "8Base-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_ssl-1:2.4.51-37.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-mod_ssl-1:2.4.51-37.el8jbcs.x86_64" }, "product_reference": "jbcs-httpd24-mod_ssl-1:2.4.51-37.el8jbcs.x86_64", "relates_to_product_reference": "8Base-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_ssl-debuginfo-1:2.4.51-37.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-mod_ssl-debuginfo-1:2.4.51-37.el8jbcs.x86_64" }, "product_reference": "jbcs-httpd24-mod_ssl-debuginfo-1:2.4.51-37.el8jbcs.x86_64", "relates_to_product_reference": "8Base-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-nghttp2-0:1.43.0-11.el8jbcs.src as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-nghttp2-0:1.43.0-11.el8jbcs.src" }, "product_reference": "jbcs-httpd24-nghttp2-0:1.43.0-11.el8jbcs.src", "relates_to_product_reference": "8Base-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-nghttp2-0:1.43.0-11.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-nghttp2-0:1.43.0-11.el8jbcs.x86_64" }, "product_reference": "jbcs-httpd24-nghttp2-0:1.43.0-11.el8jbcs.x86_64", "relates_to_product_reference": "8Base-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-nghttp2-debuginfo-0:1.43.0-11.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.43.0-11.el8jbcs.x86_64" }, "product_reference": "jbcs-httpd24-nghttp2-debuginfo-0:1.43.0-11.el8jbcs.x86_64", "relates_to_product_reference": "8Base-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-nghttp2-devel-0:1.43.0-11.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-nghttp2-devel-0:1.43.0-11.el8jbcs.x86_64" }, "product_reference": "jbcs-httpd24-nghttp2-devel-0:1.43.0-11.el8jbcs.x86_64", "relates_to_product_reference": "8Base-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-openssl-1:1.1.1k-13.el8jbcs.src as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-openssl-1:1.1.1k-13.el8jbcs.src" }, "product_reference": "jbcs-httpd24-openssl-1:1.1.1k-13.el8jbcs.src", "relates_to_product_reference": "8Base-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-openssl-1:1.1.1k-13.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-openssl-1:1.1.1k-13.el8jbcs.x86_64" }, "product_reference": "jbcs-httpd24-openssl-1:1.1.1k-13.el8jbcs.x86_64", "relates_to_product_reference": "8Base-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-openssl-chil-0:1.0.0-17.el8jbcs.src as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-17.el8jbcs.src" }, "product_reference": "jbcs-httpd24-openssl-chil-0:1.0.0-17.el8jbcs.src", "relates_to_product_reference": "8Base-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-openssl-chil-0:1.0.0-17.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-17.el8jbcs.x86_64" }, "product_reference": "jbcs-httpd24-openssl-chil-0:1.0.0-17.el8jbcs.x86_64", "relates_to_product_reference": "8Base-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-17.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-17.el8jbcs.x86_64" }, "product_reference": "jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-17.el8jbcs.x86_64", "relates_to_product_reference": "8Base-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-openssl-debuginfo-1:1.1.1k-13.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1k-13.el8jbcs.x86_64" }, "product_reference": "jbcs-httpd24-openssl-debuginfo-1:1.1.1k-13.el8jbcs.x86_64", "relates_to_product_reference": "8Base-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-openssl-devel-1:1.1.1k-13.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1k-13.el8jbcs.x86_64" }, "product_reference": "jbcs-httpd24-openssl-devel-1:1.1.1k-13.el8jbcs.x86_64", "relates_to_product_reference": "8Base-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-openssl-libs-1:1.1.1k-13.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1k-13.el8jbcs.x86_64" }, "product_reference": "jbcs-httpd24-openssl-libs-1:1.1.1k-13.el8jbcs.x86_64", "relates_to_product_reference": "8Base-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-openssl-libs-debuginfo-1:1.1.1k-13.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-openssl-libs-debuginfo-1:1.1.1k-13.el8jbcs.x86_64" }, "product_reference": "jbcs-httpd24-openssl-libs-debuginfo-1:1.1.1k-13.el8jbcs.x86_64", "relates_to_product_reference": "8Base-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-openssl-perl-1:1.1.1k-13.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1k-13.el8jbcs.x86_64" }, "product_reference": "jbcs-httpd24-openssl-perl-1:1.1.1k-13.el8jbcs.x86_64", "relates_to_product_reference": "8Base-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-openssl-pkcs11-0:0.4.10-32.el8jbcs.src as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-32.el8jbcs.src" }, "product_reference": "jbcs-httpd24-openssl-pkcs11-0:0.4.10-32.el8jbcs.src", "relates_to_product_reference": "8Base-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-openssl-pkcs11-0:0.4.10-32.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-32.el8jbcs.x86_64" }, "product_reference": "jbcs-httpd24-openssl-pkcs11-0:0.4.10-32.el8jbcs.x86_64", "relates_to_product_reference": "8Base-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-32.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-32.el8jbcs.x86_64" }, "product_reference": "jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-32.el8jbcs.x86_64", "relates_to_product_reference": "8Base-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-openssl-static-1:1.1.1k-13.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-openssl-static-1:1.1.1k-13.el8jbcs.x86_64" }, "product_reference": "jbcs-httpd24-openssl-static-1:1.1.1k-13.el8jbcs.x86_64", "relates_to_product_reference": "8Base-JBCS" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "Elison Niven" ], "organization": "Sophos", "summary": "Acknowledged by upstream." } ], "cve": "CVE-2022-1292", "cwe": { "id": "CWE-77", "name": "Improper Neutralization of Special Elements used in a Command (\u0027Command Injection\u0027)" }, "discovery_date": "2022-05-03T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-99.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-curl-0:7.86.0-2.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-curl-0:7.86.0-2.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.86.0-2.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.51-37.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.51-37.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.51-37.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.51-37.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.51-37.el7jbcs.noarch", "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.51-37.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.51-37.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-0:7.86.0-2.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.86.0-2.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-20.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-20.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.19-20.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-44.redhat_1.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-44.redhat_1.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-44.redhat_1.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.51-37.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.4.0-18.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.4.0-18.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.4.0-18.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.17-13.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.17-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-debuginfo-0:1.3.17-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.51-37.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.3-22.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.3-22.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.3-22.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.51-37.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.51-37.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.43.0-11.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.43.0-11.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.43.0-11.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.43.0-11.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-17.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-17.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-17.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-32.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-32.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-32.el7jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.1-99.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-ldap-debuginfo-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-mysql-debuginfo-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-nss-debuginfo-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-odbc-debuginfo-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-openssl-debuginfo-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-pgsql-debuginfo-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-sqlite-debuginfo-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-curl-0:7.86.0-2.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-curl-0:7.86.0-2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-curl-debuginfo-0:7.86.0-2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.51-37.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-devel-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-manual-0:2.4.51-37.el8jbcs.noarch", "8Base-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-debuginfo-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-0:7.86.0-2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-debuginfo-0:7.86.0-2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-devel-0:7.86.0-2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-20.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-20.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.19-20.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-44.redhat_1.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-44.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-debuginfo-0:1.2.48-44.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-debuginfo-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.4.0-18.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.4.0-18.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.4.0-18.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.17-13.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.17-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-debuginfo-0:1.3.17-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-debuginfo-1:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.3-22.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.3-22.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.3-22.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-debuginfo-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-1:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-debuginfo-1:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-0:1.43.0-11.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-nghttp2-0:1.43.0-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.43.0-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-devel-0:1.43.0-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-17.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-17.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-17.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-32.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-32.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-32.el8jbcs.x86_64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2081494" } ], "notes": [ { "category": "description", "text": "A flaw was found in OpenSSL. The `c_rehash` script does not properly sanitize shell meta-characters to prevent command injection. Some operating systems distribute this script in a manner where it is automatically executed. This flaw allows an attacker to execute arbitrary commands with the privileges of the script on these operating systems.", "title": "Vulnerability description" }, { "category": "summary", "text": "openssl: c_rehash script allows command injection", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Enterprise Linux uses a system-wide store of trusted certificates bundled in a single file and updated via `update-ca-trust`. The `c_rehash` script is not included in the default installation on any supported RHEL version, and is never executed automatically. For these reasons, this flaw has been rated as having a security impact of Moderate.\n\nRed Hat Enterprise Linux 7 provides a vulnerable version of the `c_rehash` script in the `openssl-perl` package, available only through the unsupported Optional repository. As the Optional repository is not supported and Red Hat Enterprise Linux 7 is in Maintenance Support 2 Phase, this issue is not planned to be addressed there.\n\nRed Hat Satellite ships an affected version of the `c_rehash` script embedded in `puppet-agent` package, however, the product is not vulnerable since it does not execute scripts with untrusted data. Moreover, the scriplet is owned by root user and is supposed to be accessed only by administrators.\n\nRed Hat updates the OpenSSL compatibility packages (compat-openssl) to only address Important or Critical security issues with backported security patches.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1k-13.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1k-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1k-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1k-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1k-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1k-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-static-1:1.1.1k-13.el7jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-1:1.1.1k-13.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-1:1.1.1k-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1k-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1k-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1k-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-libs-debuginfo-1:1.1.1k-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1k-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-static-1:1.1.1k-13.el8jbcs.x86_64" ], "known_not_affected": [ "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-99.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-curl-0:7.86.0-2.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-curl-0:7.86.0-2.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.86.0-2.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.51-37.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.51-37.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.51-37.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.51-37.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.51-37.el7jbcs.noarch", "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.51-37.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.51-37.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-0:7.86.0-2.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.86.0-2.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-20.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-20.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.19-20.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-44.redhat_1.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-44.redhat_1.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-44.redhat_1.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.51-37.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.4.0-18.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.4.0-18.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.4.0-18.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.17-13.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.17-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-debuginfo-0:1.3.17-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.51-37.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.3-22.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.3-22.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.3-22.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.51-37.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.51-37.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.43.0-11.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.43.0-11.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.43.0-11.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.43.0-11.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-17.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-17.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-17.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-32.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-32.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-32.el7jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.1-99.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-ldap-debuginfo-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-mysql-debuginfo-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-nss-debuginfo-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-odbc-debuginfo-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-openssl-debuginfo-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-pgsql-debuginfo-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-sqlite-debuginfo-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-curl-0:7.86.0-2.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-curl-0:7.86.0-2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-curl-debuginfo-0:7.86.0-2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.51-37.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-devel-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-manual-0:2.4.51-37.el8jbcs.noarch", "8Base-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-debuginfo-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-0:7.86.0-2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-debuginfo-0:7.86.0-2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-devel-0:7.86.0-2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-20.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-20.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.19-20.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-44.redhat_1.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-44.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-debuginfo-0:1.2.48-44.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-debuginfo-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.4.0-18.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.4.0-18.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.4.0-18.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.17-13.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.17-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-debuginfo-0:1.3.17-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-debuginfo-1:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.3-22.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.3-22.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.3-22.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-debuginfo-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-1:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-debuginfo-1:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-0:1.43.0-11.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-nghttp2-0:1.43.0-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.43.0-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-devel-0:1.43.0-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-17.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-17.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-17.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-32.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-32.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-32.el8jbcs.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-1292" }, { "category": "external", "summary": "RHBZ#2081494", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2081494" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-1292", "url": "https://www.cve.org/CVERecord?id=CVE-2022-1292" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-1292", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-1292" }, { "category": "external", "summary": "https://www.openssl.org/news/secadv/20220503.txt", "url": "https://www.openssl.org/news/secadv/20220503.txt" } ], "release_date": "2022-05-03T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-12-08T13:08:14+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nApplications using the APR libraries, such as httpd, must be restarted for this update to take effect. After installing the updated packages, the httpd daemon will be restarted automatically.", "product_ids": [ "7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1k-13.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1k-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1k-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1k-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1k-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1k-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-static-1:1.1.1k-13.el7jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-1:1.1.1k-13.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-1:1.1.1k-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1k-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1k-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1k-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-libs-debuginfo-1:1.1.1k-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1k-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-static-1:1.1.1k-13.el8jbcs.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:8840" }, { "category": "workaround", "details": "As mentioned in the upstream security advisory, use of the c_rehash script is considered obsolete and should be replaced by the OpenSSL rehash command line tool.", "product_ids": [ "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-99.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-curl-0:7.86.0-2.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-curl-0:7.86.0-2.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.86.0-2.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.51-37.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.51-37.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.51-37.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.51-37.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.51-37.el7jbcs.noarch", "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.51-37.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.51-37.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-0:7.86.0-2.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.86.0-2.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-20.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-20.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.19-20.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-44.redhat_1.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-44.redhat_1.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-44.redhat_1.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.51-37.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.4.0-18.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.4.0-18.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.4.0-18.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.17-13.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.17-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-debuginfo-0:1.3.17-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.51-37.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.3-22.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.3-22.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.3-22.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.51-37.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.51-37.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.43.0-11.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.43.0-11.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.43.0-11.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.43.0-11.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1k-13.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1k-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-17.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-17.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-17.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1k-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1k-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1k-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1k-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-32.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-32.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-32.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-static-1:1.1.1k-13.el7jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.1-99.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-ldap-debuginfo-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-mysql-debuginfo-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-nss-debuginfo-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-odbc-debuginfo-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-openssl-debuginfo-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-pgsql-debuginfo-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-sqlite-debuginfo-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-curl-0:7.86.0-2.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-curl-0:7.86.0-2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-curl-debuginfo-0:7.86.0-2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.51-37.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-devel-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-manual-0:2.4.51-37.el8jbcs.noarch", "8Base-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-debuginfo-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-0:7.86.0-2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-debuginfo-0:7.86.0-2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-devel-0:7.86.0-2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-20.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-20.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.19-20.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-44.redhat_1.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-44.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-debuginfo-0:1.2.48-44.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-debuginfo-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.4.0-18.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.4.0-18.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.4.0-18.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.17-13.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.17-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-debuginfo-0:1.3.17-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-debuginfo-1:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.3-22.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.3-22.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.3-22.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-debuginfo-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-1:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-debuginfo-1:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-0:1.43.0-11.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-nghttp2-0:1.43.0-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.43.0-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-devel-0:1.43.0-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-1:1.1.1k-13.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-1:1.1.1k-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-17.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-17.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-17.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1k-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1k-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1k-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-libs-debuginfo-1:1.1.1k-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1k-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-32.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-32.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-32.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-static-1:1.1.1k-13.el8jbcs.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-99.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-curl-0:7.86.0-2.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-curl-0:7.86.0-2.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.86.0-2.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.51-37.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.51-37.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.51-37.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.51-37.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.51-37.el7jbcs.noarch", "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.51-37.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.51-37.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-0:7.86.0-2.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.86.0-2.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-20.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-20.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.19-20.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-44.redhat_1.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-44.redhat_1.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-44.redhat_1.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.51-37.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.4.0-18.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.4.0-18.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.4.0-18.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.17-13.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.17-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-debuginfo-0:1.3.17-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.51-37.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.3-22.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.3-22.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.3-22.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.51-37.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.51-37.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.43.0-11.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.43.0-11.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.43.0-11.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.43.0-11.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1k-13.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1k-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-17.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-17.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-17.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1k-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1k-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1k-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1k-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-32.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-32.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-32.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-static-1:1.1.1k-13.el7jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.1-99.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-ldap-debuginfo-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-mysql-debuginfo-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-nss-debuginfo-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-odbc-debuginfo-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-openssl-debuginfo-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-pgsql-debuginfo-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-sqlite-debuginfo-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-curl-0:7.86.0-2.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-curl-0:7.86.0-2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-curl-debuginfo-0:7.86.0-2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.51-37.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-devel-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-manual-0:2.4.51-37.el8jbcs.noarch", "8Base-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-debuginfo-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-0:7.86.0-2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-debuginfo-0:7.86.0-2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-devel-0:7.86.0-2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-20.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-20.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.19-20.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-44.redhat_1.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-44.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-debuginfo-0:1.2.48-44.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-debuginfo-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.4.0-18.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.4.0-18.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.4.0-18.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.17-13.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.17-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-debuginfo-0:1.3.17-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-debuginfo-1:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.3-22.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.3-22.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.3-22.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-debuginfo-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-1:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-debuginfo-1:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-0:1.43.0-11.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-nghttp2-0:1.43.0-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.43.0-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-devel-0:1.43.0-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-1:1.1.1k-13.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-1:1.1.1k-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-17.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-17.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-17.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1k-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1k-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1k-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-libs-debuginfo-1:1.1.1k-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1k-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-32.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-32.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-32.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-static-1:1.1.1k-13.el8jbcs.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "openssl: c_rehash script allows command injection" }, { "acknowledgments": [ { "names": [ "Chancen" ], "organization": "Qingteng 73lab", "summary": "Acknowledged by upstream." } ], "cve": "CVE-2022-2068", "cwe": { "id": "CWE-77", "name": "Improper Neutralization of Special Elements used in a Command (\u0027Command Injection\u0027)" }, "discovery_date": "2022-06-15T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-99.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-curl-0:7.86.0-2.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-curl-0:7.86.0-2.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.86.0-2.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.51-37.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.51-37.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.51-37.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.51-37.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.51-37.el7jbcs.noarch", "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.51-37.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.51-37.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-0:7.86.0-2.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.86.0-2.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-20.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-20.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.19-20.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-44.redhat_1.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-44.redhat_1.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-44.redhat_1.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.51-37.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.4.0-18.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.4.0-18.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.4.0-18.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.17-13.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.17-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-debuginfo-0:1.3.17-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.51-37.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.3-22.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.3-22.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.3-22.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.51-37.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.51-37.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.43.0-11.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.43.0-11.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.43.0-11.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.43.0-11.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-17.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-17.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-17.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-32.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-32.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-32.el7jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.1-99.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-ldap-debuginfo-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-mysql-debuginfo-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-nss-debuginfo-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-odbc-debuginfo-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-openssl-debuginfo-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-pgsql-debuginfo-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-sqlite-debuginfo-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-curl-0:7.86.0-2.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-curl-0:7.86.0-2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-curl-debuginfo-0:7.86.0-2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.51-37.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-devel-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-manual-0:2.4.51-37.el8jbcs.noarch", "8Base-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-debuginfo-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-0:7.86.0-2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-debuginfo-0:7.86.0-2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-devel-0:7.86.0-2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-20.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-20.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.19-20.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-44.redhat_1.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-44.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-debuginfo-0:1.2.48-44.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-debuginfo-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.4.0-18.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.4.0-18.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.4.0-18.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.17-13.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.17-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-debuginfo-0:1.3.17-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-debuginfo-1:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.3-22.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.3-22.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.3-22.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-debuginfo-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-1:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-debuginfo-1:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-0:1.43.0-11.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-nghttp2-0:1.43.0-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.43.0-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-devel-0:1.43.0-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-17.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-17.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-17.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-32.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-32.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-32.el8jbcs.x86_64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2097310" } ], "notes": [ { "category": "description", "text": "A flaw was found in OpenSSL. The issue in CVE-2022-1292 did not find other places in the `c_rehash` script where it possibly passed the file names of certificates being hashed to a command executed through the shell. Some operating systems distribute this script in a manner where it is automatically executed. On these operating systems, this flaw allows an attacker to execute arbitrary commands with the privileges of the script.", "title": "Vulnerability description" }, { "category": "summary", "text": "openssl: the c_rehash script allows command injection", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Enterprise Linux uses a system-wide store of trusted certificates bundled in a single file and updated via `update-ca-trust`. The `c_rehash` script is not included in the default installation on any supported RHEL version and is never executed automatically. For these reasons, this flaw has been rated as having a security impact of Moderate.\n\nRed Hat Enterprise Linux 7 provides a vulnerable version of the `c_rehash` script in the `openssl-perl` package, available only through the unsupported Optional repository. As the Optional repository is not supported and Red Hat Enterprise Linux 7 is in Maintenance Support 2 Phase, this issue is not planned to be addressed there.\n\nRed Hat Satellite ships an affected version of the `c_rehash` script embedded in `puppet-agent` package, however, the product is not vulnerable since it does not execute scripts with untrusted data. Moreover, the scriplet is owned by root user and is supposed to be accessed only by administrators.\n\nRed Hat updates the OpenSSL compatibility packages (compat-openssl) to only address Important or Critical security issues with backported security patches.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1k-13.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1k-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1k-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1k-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1k-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1k-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-static-1:1.1.1k-13.el7jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-1:1.1.1k-13.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-1:1.1.1k-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1k-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1k-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1k-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-libs-debuginfo-1:1.1.1k-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1k-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-static-1:1.1.1k-13.el8jbcs.x86_64" ], "known_not_affected": [ "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-99.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-curl-0:7.86.0-2.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-curl-0:7.86.0-2.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.86.0-2.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.51-37.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.51-37.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.51-37.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.51-37.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.51-37.el7jbcs.noarch", "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.51-37.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.51-37.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-0:7.86.0-2.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.86.0-2.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-20.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-20.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.19-20.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-44.redhat_1.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-44.redhat_1.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-44.redhat_1.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.51-37.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.4.0-18.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.4.0-18.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.4.0-18.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.17-13.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.17-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-debuginfo-0:1.3.17-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.51-37.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.3-22.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.3-22.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.3-22.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.51-37.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.51-37.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.43.0-11.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.43.0-11.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.43.0-11.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.43.0-11.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-17.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-17.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-17.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-32.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-32.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-32.el7jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.1-99.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-ldap-debuginfo-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-mysql-debuginfo-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-nss-debuginfo-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-odbc-debuginfo-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-openssl-debuginfo-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-pgsql-debuginfo-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-sqlite-debuginfo-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-curl-0:7.86.0-2.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-curl-0:7.86.0-2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-curl-debuginfo-0:7.86.0-2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.51-37.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-devel-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-manual-0:2.4.51-37.el8jbcs.noarch", "8Base-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-debuginfo-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-0:7.86.0-2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-debuginfo-0:7.86.0-2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-devel-0:7.86.0-2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-20.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-20.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.19-20.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-44.redhat_1.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-44.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-debuginfo-0:1.2.48-44.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-debuginfo-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.4.0-18.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.4.0-18.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.4.0-18.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.17-13.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.17-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-debuginfo-0:1.3.17-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-debuginfo-1:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.3-22.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.3-22.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.3-22.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-debuginfo-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-1:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-debuginfo-1:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-0:1.43.0-11.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-nghttp2-0:1.43.0-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.43.0-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-devel-0:1.43.0-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-17.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-17.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-17.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-32.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-32.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-32.el8jbcs.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-2068" }, { "category": "external", "summary": "RHBZ#2097310", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2097310" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-2068", "url": "https://www.cve.org/CVERecord?id=CVE-2022-2068" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-2068", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-2068" }, { "category": "external", "summary": "https://www.openssl.org/news/secadv/20220621.txt", "url": "https://www.openssl.org/news/secadv/20220621.txt" } ], "release_date": "2022-06-21T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-12-08T13:08:14+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nApplications using the APR libraries, such as httpd, must be restarted for this update to take effect. After installing the updated packages, the httpd daemon will be restarted automatically.", "product_ids": [ "7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1k-13.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1k-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1k-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1k-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1k-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1k-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-static-1:1.1.1k-13.el7jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-1:1.1.1k-13.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-1:1.1.1k-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1k-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1k-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1k-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-libs-debuginfo-1:1.1.1k-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1k-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-static-1:1.1.1k-13.el8jbcs.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:8840" }, { "category": "workaround", "details": "As mentioned in the upstream security advisory, use of the c_rehash script is considered obsolete and should be replaced by the OpenSSL rehash command-line tool.", "product_ids": [ "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-99.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-curl-0:7.86.0-2.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-curl-0:7.86.0-2.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.86.0-2.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.51-37.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.51-37.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.51-37.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.51-37.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.51-37.el7jbcs.noarch", "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.51-37.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.51-37.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-0:7.86.0-2.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.86.0-2.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-20.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-20.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.19-20.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-44.redhat_1.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-44.redhat_1.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-44.redhat_1.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.51-37.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.4.0-18.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.4.0-18.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.4.0-18.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.17-13.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.17-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-debuginfo-0:1.3.17-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.51-37.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.3-22.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.3-22.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.3-22.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.51-37.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.51-37.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.43.0-11.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.43.0-11.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.43.0-11.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.43.0-11.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1k-13.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1k-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-17.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-17.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-17.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1k-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1k-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1k-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1k-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-32.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-32.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-32.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-static-1:1.1.1k-13.el7jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.1-99.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-ldap-debuginfo-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-mysql-debuginfo-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-nss-debuginfo-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-odbc-debuginfo-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-openssl-debuginfo-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-pgsql-debuginfo-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-sqlite-debuginfo-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-curl-0:7.86.0-2.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-curl-0:7.86.0-2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-curl-debuginfo-0:7.86.0-2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.51-37.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-devel-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-manual-0:2.4.51-37.el8jbcs.noarch", "8Base-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-debuginfo-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-0:7.86.0-2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-debuginfo-0:7.86.0-2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-devel-0:7.86.0-2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-20.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-20.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.19-20.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-44.redhat_1.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-44.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-debuginfo-0:1.2.48-44.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-debuginfo-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.4.0-18.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.4.0-18.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.4.0-18.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.17-13.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.17-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-debuginfo-0:1.3.17-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-debuginfo-1:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.3-22.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.3-22.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.3-22.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-debuginfo-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-1:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-debuginfo-1:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-0:1.43.0-11.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-nghttp2-0:1.43.0-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.43.0-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-devel-0:1.43.0-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-1:1.1.1k-13.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-1:1.1.1k-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-17.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-17.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-17.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1k-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1k-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1k-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-libs-debuginfo-1:1.1.1k-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1k-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-32.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-32.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-32.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-static-1:1.1.1k-13.el8jbcs.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-99.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-curl-0:7.86.0-2.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-curl-0:7.86.0-2.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.86.0-2.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.51-37.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.51-37.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.51-37.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.51-37.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.51-37.el7jbcs.noarch", "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.51-37.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.51-37.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-0:7.86.0-2.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.86.0-2.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-20.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-20.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.19-20.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-44.redhat_1.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-44.redhat_1.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-44.redhat_1.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.51-37.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.4.0-18.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.4.0-18.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.4.0-18.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.17-13.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.17-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-debuginfo-0:1.3.17-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.51-37.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.3-22.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.3-22.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.3-22.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.51-37.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.51-37.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.43.0-11.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.43.0-11.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.43.0-11.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.43.0-11.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1k-13.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1k-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-17.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-17.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-17.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1k-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1k-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1k-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1k-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-32.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-32.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-32.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-static-1:1.1.1k-13.el7jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.1-99.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-ldap-debuginfo-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-mysql-debuginfo-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-nss-debuginfo-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-odbc-debuginfo-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-openssl-debuginfo-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-pgsql-debuginfo-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-sqlite-debuginfo-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-curl-0:7.86.0-2.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-curl-0:7.86.0-2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-curl-debuginfo-0:7.86.0-2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.51-37.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-devel-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-manual-0:2.4.51-37.el8jbcs.noarch", "8Base-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-debuginfo-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-0:7.86.0-2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-debuginfo-0:7.86.0-2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-devel-0:7.86.0-2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-20.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-20.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.19-20.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-44.redhat_1.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-44.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-debuginfo-0:1.2.48-44.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-debuginfo-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.4.0-18.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.4.0-18.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.4.0-18.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.17-13.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.17-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-debuginfo-0:1.3.17-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-debuginfo-1:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.3-22.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.3-22.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.3-22.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-debuginfo-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-1:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-debuginfo-1:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-0:1.43.0-11.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-nghttp2-0:1.43.0-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.43.0-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-devel-0:1.43.0-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-1:1.1.1k-13.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-1:1.1.1k-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-17.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-17.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-17.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1k-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1k-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1k-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-libs-debuginfo-1:1.1.1k-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1k-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-32.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-32.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-32.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-static-1:1.1.1k-13.el8jbcs.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "openssl: the c_rehash script allows command injection" }, { "cve": "CVE-2022-22721", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "discovery_date": "2022-03-15T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-99.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-curl-0:7.86.0-2.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-curl-0:7.86.0-2.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.86.0-2.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-0:7.86.0-2.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.86.0-2.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-20.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-20.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.19-20.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-44.redhat_1.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-44.redhat_1.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-44.redhat_1.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.4.0-18.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.4.0-18.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.4.0-18.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.17-13.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.17-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-debuginfo-0:1.3.17-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.3-22.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.3-22.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.3-22.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.43.0-11.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.43.0-11.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.43.0-11.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.43.0-11.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1k-13.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1k-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-17.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-17.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-17.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1k-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1k-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1k-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1k-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-32.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-32.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-32.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-static-1:1.1.1k-13.el7jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.1-99.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-ldap-debuginfo-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-mysql-debuginfo-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-nss-debuginfo-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-odbc-debuginfo-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-openssl-debuginfo-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-pgsql-debuginfo-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-sqlite-debuginfo-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-curl-0:7.86.0-2.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-curl-0:7.86.0-2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-curl-debuginfo-0:7.86.0-2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-0:7.86.0-2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-debuginfo-0:7.86.0-2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-devel-0:7.86.0-2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-20.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-20.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.19-20.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-44.redhat_1.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-44.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-debuginfo-0:1.2.48-44.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.4.0-18.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.4.0-18.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.4.0-18.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.17-13.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.17-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-debuginfo-0:1.3.17-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.3-22.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.3-22.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.3-22.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-0:1.43.0-11.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-nghttp2-0:1.43.0-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.43.0-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-devel-0:1.43.0-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-1:1.1.1k-13.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-1:1.1.1k-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-17.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-17.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-17.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1k-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1k-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1k-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-libs-debuginfo-1:1.1.1k-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1k-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-32.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-32.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-32.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-static-1:1.1.1k-13.el8jbcs.x86_64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2064320" } ], "notes": [ { "category": "description", "text": "A flaw was found in httpd, where it incorrectly limits the value of the LimitXMLRequestBody option. This issue can lead to an integer overflow and later causes an out-of-bounds write.", "title": "Vulnerability description" }, { "category": "summary", "text": "httpd: core: Possible buffer overflow with very large or unlimited LimitXMLRequestBody", "title": "Vulnerability summary" }, { "category": "other", "text": "The default configuration of the LimitXMLRequestBody option on RHEL is 1MB and therefore is not vulnerable to this flaw. Also, this issue is known to only affect 32bit httpd builds.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.51-37.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.51-37.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.51-37.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.51-37.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.51-37.el7jbcs.noarch", "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.51-37.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.51-37.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.51-37.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.51-37.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.51-37.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.51-37.el7jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.51-37.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-devel-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-manual-0:2.4.51-37.el8jbcs.noarch", "8Base-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-debuginfo-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-debuginfo-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-debuginfo-1:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-debuginfo-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-1:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-debuginfo-1:2.4.51-37.el8jbcs.x86_64" ], "known_not_affected": [ "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-99.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-curl-0:7.86.0-2.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-curl-0:7.86.0-2.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.86.0-2.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-0:7.86.0-2.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.86.0-2.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-20.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-20.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.19-20.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-44.redhat_1.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-44.redhat_1.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-44.redhat_1.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.4.0-18.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.4.0-18.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.4.0-18.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.17-13.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.17-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-debuginfo-0:1.3.17-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.3-22.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.3-22.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.3-22.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.43.0-11.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.43.0-11.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.43.0-11.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.43.0-11.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1k-13.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1k-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-17.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-17.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-17.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1k-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1k-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1k-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1k-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-32.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-32.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-32.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-static-1:1.1.1k-13.el7jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.1-99.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-ldap-debuginfo-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-mysql-debuginfo-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-nss-debuginfo-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-odbc-debuginfo-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-openssl-debuginfo-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-pgsql-debuginfo-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-sqlite-debuginfo-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-curl-0:7.86.0-2.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-curl-0:7.86.0-2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-curl-debuginfo-0:7.86.0-2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-0:7.86.0-2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-debuginfo-0:7.86.0-2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-devel-0:7.86.0-2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-20.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-20.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.19-20.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-44.redhat_1.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-44.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-debuginfo-0:1.2.48-44.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.4.0-18.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.4.0-18.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.4.0-18.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.17-13.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.17-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-debuginfo-0:1.3.17-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.3-22.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.3-22.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.3-22.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-0:1.43.0-11.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-nghttp2-0:1.43.0-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.43.0-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-devel-0:1.43.0-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-1:1.1.1k-13.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-1:1.1.1k-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-17.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-17.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-17.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1k-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1k-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1k-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-libs-debuginfo-1:1.1.1k-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1k-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-32.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-32.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-32.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-static-1:1.1.1k-13.el8jbcs.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-22721" }, { "category": "external", "summary": "RHBZ#2064320", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2064320" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-22721", "url": "https://www.cve.org/CVERecord?id=CVE-2022-22721" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-22721", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-22721" }, { "category": "external", "summary": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2022-22721", "url": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2022-22721" } ], "release_date": "2022-03-14T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-12-08T13:08:14+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nApplications using the APR libraries, such as httpd, must be restarted for this update to take effect. After installing the updated packages, the httpd daemon will be restarted automatically.", "product_ids": [ "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.51-37.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.51-37.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.51-37.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.51-37.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.51-37.el7jbcs.noarch", "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.51-37.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.51-37.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.51-37.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.51-37.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.51-37.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.51-37.el7jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.51-37.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-devel-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-manual-0:2.4.51-37.el8jbcs.noarch", "8Base-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-debuginfo-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-debuginfo-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-debuginfo-1:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-debuginfo-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-1:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-debuginfo-1:2.4.51-37.el8jbcs.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:8840" }, { "category": "workaround", "details": "Set the LimitXMLRequestBody option to a value smaller than 350MB. Setting it to 0 is not recommended as it will use a hard limit (depending on 32bit or 64bit systems) which may result in an overall system out-of-memory. The default configuration is not vulnerable to this flaw, see the statement above.", "product_ids": [ "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-99.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-curl-0:7.86.0-2.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-curl-0:7.86.0-2.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.86.0-2.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.51-37.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.51-37.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.51-37.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.51-37.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.51-37.el7jbcs.noarch", "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.51-37.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.51-37.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-0:7.86.0-2.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.86.0-2.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-20.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-20.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.19-20.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-44.redhat_1.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-44.redhat_1.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-44.redhat_1.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.51-37.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.4.0-18.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.4.0-18.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.4.0-18.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.17-13.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.17-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-debuginfo-0:1.3.17-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.51-37.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.3-22.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.3-22.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.3-22.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.51-37.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.51-37.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.43.0-11.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.43.0-11.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.43.0-11.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.43.0-11.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1k-13.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1k-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-17.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-17.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-17.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1k-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1k-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1k-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1k-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-32.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-32.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-32.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-static-1:1.1.1k-13.el7jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.1-99.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-ldap-debuginfo-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-mysql-debuginfo-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-nss-debuginfo-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-odbc-debuginfo-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-openssl-debuginfo-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-pgsql-debuginfo-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-sqlite-debuginfo-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-curl-0:7.86.0-2.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-curl-0:7.86.0-2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-curl-debuginfo-0:7.86.0-2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.51-37.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-devel-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-manual-0:2.4.51-37.el8jbcs.noarch", "8Base-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-debuginfo-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-0:7.86.0-2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-debuginfo-0:7.86.0-2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-devel-0:7.86.0-2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-20.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-20.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.19-20.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-44.redhat_1.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-44.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-debuginfo-0:1.2.48-44.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-debuginfo-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.4.0-18.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.4.0-18.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.4.0-18.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.17-13.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.17-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-debuginfo-0:1.3.17-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-debuginfo-1:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.3-22.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.3-22.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.3-22.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-debuginfo-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-1:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-debuginfo-1:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-0:1.43.0-11.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-nghttp2-0:1.43.0-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.43.0-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-devel-0:1.43.0-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-1:1.1.1k-13.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-1:1.1.1k-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-17.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-17.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-17.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1k-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1k-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1k-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-libs-debuginfo-1:1.1.1k-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1k-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-32.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-32.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-32.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-static-1:1.1.1k-13.el8jbcs.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.4, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:H", "version": "3.1" }, "products": [ "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-99.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-curl-0:7.86.0-2.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-curl-0:7.86.0-2.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.86.0-2.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.51-37.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.51-37.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.51-37.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.51-37.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.51-37.el7jbcs.noarch", "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.51-37.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.51-37.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-0:7.86.0-2.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.86.0-2.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-20.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-20.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.19-20.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-44.redhat_1.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-44.redhat_1.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-44.redhat_1.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.51-37.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.4.0-18.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.4.0-18.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.4.0-18.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.17-13.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.17-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-debuginfo-0:1.3.17-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.51-37.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.3-22.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.3-22.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.3-22.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.51-37.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.51-37.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.43.0-11.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.43.0-11.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.43.0-11.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.43.0-11.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1k-13.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1k-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-17.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-17.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-17.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1k-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1k-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1k-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1k-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-32.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-32.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-32.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-static-1:1.1.1k-13.el7jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.1-99.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-ldap-debuginfo-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-mysql-debuginfo-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-nss-debuginfo-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-odbc-debuginfo-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-openssl-debuginfo-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-pgsql-debuginfo-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-sqlite-debuginfo-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-curl-0:7.86.0-2.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-curl-0:7.86.0-2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-curl-debuginfo-0:7.86.0-2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.51-37.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-devel-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-manual-0:2.4.51-37.el8jbcs.noarch", "8Base-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-debuginfo-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-0:7.86.0-2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-debuginfo-0:7.86.0-2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-devel-0:7.86.0-2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-20.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-20.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.19-20.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-44.redhat_1.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-44.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-debuginfo-0:1.2.48-44.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-debuginfo-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.4.0-18.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.4.0-18.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.4.0-18.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.17-13.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.17-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-debuginfo-0:1.3.17-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-debuginfo-1:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.3-22.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.3-22.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.3-22.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-debuginfo-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-1:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-debuginfo-1:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-0:1.43.0-11.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-nghttp2-0:1.43.0-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.43.0-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-devel-0:1.43.0-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-1:1.1.1k-13.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-1:1.1.1k-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-17.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-17.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-17.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1k-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1k-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1k-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-libs-debuginfo-1:1.1.1k-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1k-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-32.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-32.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-32.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-static-1:1.1.1k-13.el8jbcs.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "httpd: core: Possible buffer overflow with very large or unlimited LimitXMLRequestBody" }, { "cve": "CVE-2022-23943", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "discovery_date": "2022-03-15T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-99.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-curl-0:7.86.0-2.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-curl-0:7.86.0-2.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.86.0-2.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-0:7.86.0-2.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.86.0-2.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-20.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-20.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.19-20.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-44.redhat_1.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-44.redhat_1.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-44.redhat_1.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.4.0-18.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.4.0-18.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.4.0-18.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.17-13.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.17-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-debuginfo-0:1.3.17-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.3-22.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.3-22.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.3-22.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.43.0-11.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.43.0-11.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.43.0-11.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.43.0-11.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1k-13.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1k-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-17.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-17.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-17.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1k-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1k-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1k-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1k-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-32.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-32.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-32.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-static-1:1.1.1k-13.el7jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.1-99.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-ldap-debuginfo-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-mysql-debuginfo-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-nss-debuginfo-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-odbc-debuginfo-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-openssl-debuginfo-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-pgsql-debuginfo-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-sqlite-debuginfo-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-curl-0:7.86.0-2.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-curl-0:7.86.0-2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-curl-debuginfo-0:7.86.0-2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-0:7.86.0-2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-debuginfo-0:7.86.0-2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-devel-0:7.86.0-2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-20.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-20.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.19-20.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-44.redhat_1.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-44.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-debuginfo-0:1.2.48-44.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.4.0-18.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.4.0-18.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.4.0-18.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.17-13.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.17-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-debuginfo-0:1.3.17-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.3-22.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.3-22.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.3-22.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-0:1.43.0-11.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-nghttp2-0:1.43.0-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.43.0-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-devel-0:1.43.0-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-1:1.1.1k-13.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-1:1.1.1k-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-17.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-17.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-17.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1k-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1k-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1k-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-libs-debuginfo-1:1.1.1k-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1k-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-32.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-32.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-32.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-static-1:1.1.1k-13.el8jbcs.x86_64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2064319" } ], "notes": [ { "category": "description", "text": "An out-of-bounds read/write vulnerability was found in the mod_sed module of httpd. This flaw allows an attacker to overwrite the memory of an httpd instance that is using mod_sed with data provided by the attacker.", "title": "Vulnerability description" }, { "category": "summary", "text": "httpd: mod_sed: Read/write beyond bounds", "title": "Vulnerability summary" }, { "category": "other", "text": "The `mod_sed` module is disabled by default on Red Hat Enterprise Linux 7 and 8. For this reason, the flaw has been rated as having a security impact of Moderate. The httpd package as shipped with Red Hat Enterprise Linux 6 is not affected by this flaw because the `mod_sed` module is available only in httpd 2.3 and later.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.51-37.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.51-37.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.51-37.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.51-37.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.51-37.el7jbcs.noarch", "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.51-37.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.51-37.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.51-37.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.51-37.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.51-37.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.51-37.el7jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.51-37.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-devel-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-manual-0:2.4.51-37.el8jbcs.noarch", "8Base-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-debuginfo-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-debuginfo-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-debuginfo-1:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-debuginfo-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-1:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-debuginfo-1:2.4.51-37.el8jbcs.x86_64" ], "known_not_affected": [ "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-99.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-curl-0:7.86.0-2.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-curl-0:7.86.0-2.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.86.0-2.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-0:7.86.0-2.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.86.0-2.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-20.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-20.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.19-20.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-44.redhat_1.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-44.redhat_1.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-44.redhat_1.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.4.0-18.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.4.0-18.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.4.0-18.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.17-13.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.17-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-debuginfo-0:1.3.17-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.3-22.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.3-22.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.3-22.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.43.0-11.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.43.0-11.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.43.0-11.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.43.0-11.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1k-13.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1k-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-17.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-17.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-17.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1k-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1k-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1k-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1k-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-32.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-32.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-32.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-static-1:1.1.1k-13.el7jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.1-99.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-ldap-debuginfo-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-mysql-debuginfo-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-nss-debuginfo-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-odbc-debuginfo-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-openssl-debuginfo-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-pgsql-debuginfo-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-sqlite-debuginfo-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-curl-0:7.86.0-2.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-curl-0:7.86.0-2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-curl-debuginfo-0:7.86.0-2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-0:7.86.0-2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-debuginfo-0:7.86.0-2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-devel-0:7.86.0-2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-20.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-20.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.19-20.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-44.redhat_1.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-44.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-debuginfo-0:1.2.48-44.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.4.0-18.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.4.0-18.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.4.0-18.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.17-13.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.17-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-debuginfo-0:1.3.17-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.3-22.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.3-22.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.3-22.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-0:1.43.0-11.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-nghttp2-0:1.43.0-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.43.0-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-devel-0:1.43.0-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-1:1.1.1k-13.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-1:1.1.1k-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-17.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-17.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-17.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1k-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1k-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1k-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-libs-debuginfo-1:1.1.1k-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1k-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-32.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-32.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-32.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-static-1:1.1.1k-13.el8jbcs.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-23943" }, { "category": "external", "summary": "RHBZ#2064319", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2064319" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-23943", "url": "https://www.cve.org/CVERecord?id=CVE-2022-23943" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-23943", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-23943" }, { "category": "external", "summary": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2022-23943", "url": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2022-23943" } ], "release_date": "2022-03-14T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-12-08T13:08:14+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nApplications using the APR libraries, such as httpd, must be restarted for this update to take effect. After installing the updated packages, the httpd daemon will be restarted automatically.", "product_ids": [ "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.51-37.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.51-37.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.51-37.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.51-37.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.51-37.el7jbcs.noarch", "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.51-37.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.51-37.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.51-37.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.51-37.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.51-37.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.51-37.el7jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.51-37.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-devel-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-manual-0:2.4.51-37.el8jbcs.noarch", "8Base-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-debuginfo-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-debuginfo-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-debuginfo-1:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-debuginfo-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-1:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-debuginfo-1:2.4.51-37.el8jbcs.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:8840" }, { "category": "workaround", "details": "Disabling mod_sed and restarting httpd will mitigate this flaw. See https://access.redhat.com/articles/10649 for more information.", "product_ids": [ "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-99.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-curl-0:7.86.0-2.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-curl-0:7.86.0-2.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.86.0-2.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.51-37.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.51-37.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.51-37.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.51-37.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.51-37.el7jbcs.noarch", "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.51-37.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.51-37.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-0:7.86.0-2.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.86.0-2.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-20.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-20.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.19-20.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-44.redhat_1.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-44.redhat_1.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-44.redhat_1.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.51-37.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.4.0-18.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.4.0-18.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.4.0-18.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.17-13.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.17-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-debuginfo-0:1.3.17-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.51-37.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.3-22.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.3-22.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.3-22.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.51-37.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.51-37.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.43.0-11.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.43.0-11.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.43.0-11.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.43.0-11.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1k-13.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1k-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-17.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-17.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-17.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1k-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1k-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1k-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1k-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-32.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-32.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-32.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-static-1:1.1.1k-13.el7jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.1-99.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-ldap-debuginfo-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-mysql-debuginfo-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-nss-debuginfo-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-odbc-debuginfo-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-openssl-debuginfo-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-pgsql-debuginfo-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-sqlite-debuginfo-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-curl-0:7.86.0-2.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-curl-0:7.86.0-2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-curl-debuginfo-0:7.86.0-2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.51-37.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-devel-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-manual-0:2.4.51-37.el8jbcs.noarch", "8Base-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-debuginfo-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-0:7.86.0-2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-debuginfo-0:7.86.0-2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-devel-0:7.86.0-2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-20.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-20.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.19-20.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-44.redhat_1.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-44.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-debuginfo-0:1.2.48-44.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-debuginfo-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.4.0-18.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.4.0-18.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.4.0-18.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.17-13.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.17-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-debuginfo-0:1.3.17-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-debuginfo-1:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.3-22.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.3-22.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.3-22.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-debuginfo-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-1:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-debuginfo-1:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-0:1.43.0-11.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-nghttp2-0:1.43.0-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.43.0-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-devel-0:1.43.0-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-1:1.1.1k-13.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-1:1.1.1k-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-17.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-17.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-17.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1k-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1k-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1k-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-libs-debuginfo-1:1.1.1k-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1k-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-32.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-32.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-32.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-static-1:1.1.1k-13.el8jbcs.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-99.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-curl-0:7.86.0-2.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-curl-0:7.86.0-2.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.86.0-2.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.51-37.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.51-37.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.51-37.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.51-37.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.51-37.el7jbcs.noarch", "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.51-37.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.51-37.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-0:7.86.0-2.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.86.0-2.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-20.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-20.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.19-20.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-44.redhat_1.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-44.redhat_1.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-44.redhat_1.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.51-37.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.4.0-18.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.4.0-18.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.4.0-18.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.17-13.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.17-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-debuginfo-0:1.3.17-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.51-37.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.3-22.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.3-22.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.3-22.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.51-37.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.51-37.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.43.0-11.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.43.0-11.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.43.0-11.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.43.0-11.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1k-13.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1k-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-17.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-17.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-17.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1k-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1k-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1k-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1k-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-32.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-32.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-32.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-static-1:1.1.1k-13.el7jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.1-99.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-ldap-debuginfo-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-mysql-debuginfo-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-nss-debuginfo-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-odbc-debuginfo-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-openssl-debuginfo-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-pgsql-debuginfo-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-sqlite-debuginfo-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-curl-0:7.86.0-2.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-curl-0:7.86.0-2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-curl-debuginfo-0:7.86.0-2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.51-37.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-devel-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-manual-0:2.4.51-37.el8jbcs.noarch", "8Base-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-debuginfo-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-0:7.86.0-2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-debuginfo-0:7.86.0-2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-devel-0:7.86.0-2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-20.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-20.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.19-20.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-44.redhat_1.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-44.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-debuginfo-0:1.2.48-44.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-debuginfo-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.4.0-18.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.4.0-18.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.4.0-18.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.17-13.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.17-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-debuginfo-0:1.3.17-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-debuginfo-1:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.3-22.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.3-22.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.3-22.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-debuginfo-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-1:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-debuginfo-1:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-0:1.43.0-11.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-nghttp2-0:1.43.0-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.43.0-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-devel-0:1.43.0-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-1:1.1.1k-13.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-1:1.1.1k-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-17.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-17.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-17.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1k-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1k-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1k-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-libs-debuginfo-1:1.1.1k-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1k-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-32.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-32.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-32.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-static-1:1.1.1k-13.el8jbcs.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "httpd: mod_sed: Read/write beyond bounds" }, { "cve": "CVE-2022-26377", "cwe": { "id": "CWE-444", "name": "Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027)" }, "discovery_date": "2022-06-08T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-99.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-curl-0:7.86.0-2.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-curl-0:7.86.0-2.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.86.0-2.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-0:7.86.0-2.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.86.0-2.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-20.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-20.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.19-20.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-44.redhat_1.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-44.redhat_1.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-44.redhat_1.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.4.0-18.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.4.0-18.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.4.0-18.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.17-13.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.17-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-debuginfo-0:1.3.17-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.3-22.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.3-22.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.3-22.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.43.0-11.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.43.0-11.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.43.0-11.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.43.0-11.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1k-13.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1k-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-17.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-17.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-17.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1k-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1k-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1k-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1k-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-32.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-32.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-32.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-static-1:1.1.1k-13.el7jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.1-99.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-ldap-debuginfo-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-mysql-debuginfo-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-nss-debuginfo-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-odbc-debuginfo-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-openssl-debuginfo-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-pgsql-debuginfo-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-sqlite-debuginfo-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-curl-0:7.86.0-2.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-curl-0:7.86.0-2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-curl-debuginfo-0:7.86.0-2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-0:7.86.0-2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-debuginfo-0:7.86.0-2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-devel-0:7.86.0-2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-20.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-20.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.19-20.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-44.redhat_1.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-44.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-debuginfo-0:1.2.48-44.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.4.0-18.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.4.0-18.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.4.0-18.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.17-13.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.17-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-debuginfo-0:1.3.17-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.3-22.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.3-22.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.3-22.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-0:1.43.0-11.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-nghttp2-0:1.43.0-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.43.0-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-devel-0:1.43.0-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-1:1.1.1k-13.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-1:1.1.1k-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-17.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-17.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-17.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1k-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1k-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1k-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-libs-debuginfo-1:1.1.1k-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1k-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-32.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-32.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-32.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-static-1:1.1.1k-13.el8jbcs.x86_64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2094997" } ], "notes": [ { "category": "description", "text": "An HTTP request smuggling vulnerability was found in the mod_proxy_ajp module of httpd. This flaw allows an attacker to smuggle requests to the AJP server, where it forwards requests.", "title": "Vulnerability description" }, { "category": "summary", "text": "httpd: mod_proxy_ajp: Possible request smuggling", "title": "Vulnerability summary" }, { "category": "other", "text": "The httpd mod_proxy_ajp module is enabled by default on Red Hat Enterprise Linux 8, 9, and in RHSCL. However, there are no directives forwarding requests using the AJP protocol.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.51-37.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.51-37.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.51-37.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.51-37.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.51-37.el7jbcs.noarch", "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.51-37.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.51-37.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.51-37.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.51-37.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.51-37.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.51-37.el7jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.51-37.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-devel-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-manual-0:2.4.51-37.el8jbcs.noarch", "8Base-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-debuginfo-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-debuginfo-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-debuginfo-1:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-debuginfo-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-1:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-debuginfo-1:2.4.51-37.el8jbcs.x86_64" ], "known_not_affected": [ "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-99.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-curl-0:7.86.0-2.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-curl-0:7.86.0-2.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.86.0-2.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-0:7.86.0-2.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.86.0-2.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-20.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-20.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.19-20.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-44.redhat_1.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-44.redhat_1.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-44.redhat_1.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.4.0-18.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.4.0-18.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.4.0-18.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.17-13.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.17-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-debuginfo-0:1.3.17-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.3-22.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.3-22.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.3-22.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.43.0-11.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.43.0-11.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.43.0-11.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.43.0-11.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1k-13.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1k-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-17.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-17.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-17.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1k-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1k-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1k-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1k-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-32.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-32.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-32.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-static-1:1.1.1k-13.el7jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.1-99.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-ldap-debuginfo-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-mysql-debuginfo-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-nss-debuginfo-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-odbc-debuginfo-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-openssl-debuginfo-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-pgsql-debuginfo-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-sqlite-debuginfo-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-curl-0:7.86.0-2.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-curl-0:7.86.0-2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-curl-debuginfo-0:7.86.0-2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-0:7.86.0-2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-debuginfo-0:7.86.0-2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-devel-0:7.86.0-2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-20.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-20.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.19-20.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-44.redhat_1.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-44.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-debuginfo-0:1.2.48-44.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.4.0-18.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.4.0-18.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.4.0-18.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.17-13.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.17-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-debuginfo-0:1.3.17-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.3-22.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.3-22.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.3-22.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-0:1.43.0-11.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-nghttp2-0:1.43.0-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.43.0-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-devel-0:1.43.0-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-1:1.1.1k-13.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-1:1.1.1k-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-17.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-17.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-17.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1k-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1k-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1k-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-libs-debuginfo-1:1.1.1k-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1k-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-32.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-32.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-32.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-static-1:1.1.1k-13.el8jbcs.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-26377" }, { "category": "external", "summary": "RHBZ#2094997", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2094997" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-26377", "url": "https://www.cve.org/CVERecord?id=CVE-2022-26377" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-26377", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-26377" }, { "category": "external", "summary": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2022-26377", "url": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2022-26377" } ], "release_date": "2022-06-08T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-12-08T13:08:14+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nApplications using the APR libraries, such as httpd, must be restarted for this update to take effect. After installing the updated packages, the httpd daemon will be restarted automatically.", "product_ids": [ "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.51-37.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.51-37.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.51-37.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.51-37.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.51-37.el7jbcs.noarch", "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.51-37.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.51-37.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.51-37.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.51-37.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.51-37.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.51-37.el7jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.51-37.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-devel-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-manual-0:2.4.51-37.el8jbcs.noarch", "8Base-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-debuginfo-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-debuginfo-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-debuginfo-1:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-debuginfo-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-1:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-debuginfo-1:2.4.51-37.el8jbcs.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:8840" }, { "category": "workaround", "details": "Disabling mod_proxy_ajp and restarting httpd will mitigate this flaw.", "product_ids": [ "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-99.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-curl-0:7.86.0-2.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-curl-0:7.86.0-2.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.86.0-2.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.51-37.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.51-37.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.51-37.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.51-37.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.51-37.el7jbcs.noarch", "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.51-37.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.51-37.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-0:7.86.0-2.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.86.0-2.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-20.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-20.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.19-20.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-44.redhat_1.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-44.redhat_1.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-44.redhat_1.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.51-37.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.4.0-18.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.4.0-18.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.4.0-18.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.17-13.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.17-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-debuginfo-0:1.3.17-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.51-37.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.3-22.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.3-22.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.3-22.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.51-37.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.51-37.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.43.0-11.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.43.0-11.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.43.0-11.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.43.0-11.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1k-13.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1k-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-17.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-17.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-17.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1k-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1k-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1k-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1k-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-32.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-32.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-32.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-static-1:1.1.1k-13.el7jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.1-99.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-ldap-debuginfo-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-mysql-debuginfo-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-nss-debuginfo-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-odbc-debuginfo-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-openssl-debuginfo-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-pgsql-debuginfo-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-sqlite-debuginfo-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-curl-0:7.86.0-2.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-curl-0:7.86.0-2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-curl-debuginfo-0:7.86.0-2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.51-37.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-devel-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-manual-0:2.4.51-37.el8jbcs.noarch", "8Base-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-debuginfo-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-0:7.86.0-2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-debuginfo-0:7.86.0-2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-devel-0:7.86.0-2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-20.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-20.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.19-20.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-44.redhat_1.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-44.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-debuginfo-0:1.2.48-44.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-debuginfo-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.4.0-18.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.4.0-18.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.4.0-18.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.17-13.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.17-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-debuginfo-0:1.3.17-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-debuginfo-1:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.3-22.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.3-22.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.3-22.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-debuginfo-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-1:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-debuginfo-1:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-0:1.43.0-11.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-nghttp2-0:1.43.0-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.43.0-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-devel-0:1.43.0-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-1:1.1.1k-13.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-1:1.1.1k-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-17.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-17.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-17.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1k-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1k-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1k-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-libs-debuginfo-1:1.1.1k-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1k-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-32.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-32.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-32.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-static-1:1.1.1k-13.el8jbcs.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:L", "version": "3.1" }, "products": [ "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-99.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-curl-0:7.86.0-2.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-curl-0:7.86.0-2.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.86.0-2.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.51-37.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.51-37.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.51-37.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.51-37.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.51-37.el7jbcs.noarch", "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.51-37.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.51-37.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-0:7.86.0-2.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.86.0-2.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-20.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-20.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.19-20.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-44.redhat_1.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-44.redhat_1.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-44.redhat_1.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.51-37.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.4.0-18.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.4.0-18.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.4.0-18.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.17-13.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.17-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-debuginfo-0:1.3.17-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.51-37.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.3-22.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.3-22.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.3-22.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.51-37.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.51-37.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.43.0-11.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.43.0-11.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.43.0-11.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.43.0-11.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1k-13.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1k-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-17.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-17.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-17.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1k-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1k-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1k-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1k-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-32.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-32.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-32.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-static-1:1.1.1k-13.el7jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.1-99.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-ldap-debuginfo-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-mysql-debuginfo-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-nss-debuginfo-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-odbc-debuginfo-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-openssl-debuginfo-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-pgsql-debuginfo-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-sqlite-debuginfo-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-curl-0:7.86.0-2.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-curl-0:7.86.0-2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-curl-debuginfo-0:7.86.0-2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.51-37.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-devel-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-manual-0:2.4.51-37.el8jbcs.noarch", "8Base-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-debuginfo-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-0:7.86.0-2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-debuginfo-0:7.86.0-2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-devel-0:7.86.0-2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-20.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-20.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.19-20.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-44.redhat_1.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-44.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-debuginfo-0:1.2.48-44.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-debuginfo-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.4.0-18.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.4.0-18.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.4.0-18.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.17-13.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.17-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-debuginfo-0:1.3.17-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-debuginfo-1:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.3-22.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.3-22.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.3-22.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-debuginfo-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-1:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-debuginfo-1:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-0:1.43.0-11.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-nghttp2-0:1.43.0-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.43.0-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-devel-0:1.43.0-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-1:1.1.1k-13.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-1:1.1.1k-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-17.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-17.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-17.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1k-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1k-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1k-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-libs-debuginfo-1:1.1.1k-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1k-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-32.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-32.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-32.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-static-1:1.1.1k-13.el8jbcs.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "httpd: mod_proxy_ajp: Possible request smuggling" }, { "cve": "CVE-2022-27781", "cwe": { "id": "CWE-835", "name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)" }, "discovery_date": "2022-05-05T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-99.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.51-37.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.51-37.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.51-37.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.51-37.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.51-37.el7jbcs.noarch", "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.51-37.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.51-37.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-20.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-20.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.19-20.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-44.redhat_1.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-44.redhat_1.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-44.redhat_1.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.51-37.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.4.0-18.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.4.0-18.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.4.0-18.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.17-13.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.17-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-debuginfo-0:1.3.17-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.51-37.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.3-22.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.3-22.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.3-22.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.51-37.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.51-37.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.43.0-11.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.43.0-11.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.43.0-11.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.43.0-11.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1k-13.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1k-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-17.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-17.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-17.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1k-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1k-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1k-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1k-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-32.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-32.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-32.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-static-1:1.1.1k-13.el7jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.1-99.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-ldap-debuginfo-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-mysql-debuginfo-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-nss-debuginfo-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-odbc-debuginfo-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-openssl-debuginfo-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-pgsql-debuginfo-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-sqlite-debuginfo-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.51-37.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-devel-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-manual-0:2.4.51-37.el8jbcs.noarch", "8Base-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-debuginfo-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-20.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-20.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.19-20.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-44.redhat_1.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-44.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-debuginfo-0:1.2.48-44.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-debuginfo-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.4.0-18.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.4.0-18.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.4.0-18.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.17-13.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.17-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-debuginfo-0:1.3.17-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-debuginfo-1:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.3-22.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.3-22.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.3-22.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-debuginfo-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-1:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-debuginfo-1:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-0:1.43.0-11.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-nghttp2-0:1.43.0-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.43.0-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-devel-0:1.43.0-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-1:1.1.1k-13.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-1:1.1.1k-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-17.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-17.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-17.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1k-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1k-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1k-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-libs-debuginfo-1:1.1.1k-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1k-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-32.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-32.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-32.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-static-1:1.1.1k-13.el8jbcs.x86_64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2082204" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in curl. This issue occurs due to an erroneous function. A malicious server could make curl within Network Security Services (NSS) get stuck in a never-ending busy loop when trying to retrieve that information. This flaw allows an Infinite Loop, affecting system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "curl: CERTINFO never-ending busy-loop", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Enterprise Linux 8 and 9 are not affected because our build of curl does not use NSS for TLS.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-JBCS:jbcs-httpd24-curl-0:7.86.0-2.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-curl-0:7.86.0-2.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.86.0-2.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-0:7.86.0-2.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.86.0-2.el7jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-curl-0:7.86.0-2.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-curl-0:7.86.0-2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-curl-debuginfo-0:7.86.0-2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-0:7.86.0-2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-debuginfo-0:7.86.0-2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-devel-0:7.86.0-2.el8jbcs.x86_64" ], "known_not_affected": [ "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-99.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.51-37.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.51-37.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.51-37.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.51-37.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.51-37.el7jbcs.noarch", "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.51-37.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.51-37.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-20.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-20.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.19-20.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-44.redhat_1.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-44.redhat_1.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-44.redhat_1.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.51-37.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.4.0-18.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.4.0-18.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.4.0-18.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.17-13.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.17-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-debuginfo-0:1.3.17-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.51-37.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.3-22.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.3-22.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.3-22.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.51-37.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.51-37.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.43.0-11.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.43.0-11.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.43.0-11.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.43.0-11.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1k-13.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1k-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-17.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-17.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-17.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1k-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1k-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1k-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1k-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-32.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-32.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-32.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-static-1:1.1.1k-13.el7jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.1-99.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-ldap-debuginfo-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-mysql-debuginfo-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-nss-debuginfo-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-odbc-debuginfo-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-openssl-debuginfo-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-pgsql-debuginfo-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-sqlite-debuginfo-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.51-37.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-devel-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-manual-0:2.4.51-37.el8jbcs.noarch", "8Base-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-debuginfo-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-20.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-20.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.19-20.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-44.redhat_1.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-44.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-debuginfo-0:1.2.48-44.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-debuginfo-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.4.0-18.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.4.0-18.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.4.0-18.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.17-13.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.17-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-debuginfo-0:1.3.17-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-debuginfo-1:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.3-22.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.3-22.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.3-22.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-debuginfo-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-1:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-debuginfo-1:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-0:1.43.0-11.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-nghttp2-0:1.43.0-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.43.0-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-devel-0:1.43.0-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-1:1.1.1k-13.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-1:1.1.1k-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-17.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-17.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-17.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1k-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1k-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1k-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-libs-debuginfo-1:1.1.1k-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1k-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-32.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-32.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-32.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-static-1:1.1.1k-13.el8jbcs.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-27781" }, { "category": "external", "summary": "RHBZ#2082204", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2082204" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-27781", "url": "https://www.cve.org/CVERecord?id=CVE-2022-27781" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-27781", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-27781" }, { "category": "external", "summary": "https://curl.se/docs/CVE-2022-27781.html", "url": "https://curl.se/docs/CVE-2022-27781.html" } ], "release_date": "2022-05-11T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-12-08T13:08:14+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nApplications using the APR libraries, such as httpd, must be restarted for this update to take effect. After installing the updated packages, the httpd daemon will be restarted automatically.", "product_ids": [ "7Server-JBCS:jbcs-httpd24-curl-0:7.86.0-2.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-curl-0:7.86.0-2.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.86.0-2.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-0:7.86.0-2.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.86.0-2.el7jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-curl-0:7.86.0-2.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-curl-0:7.86.0-2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-curl-debuginfo-0:7.86.0-2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-0:7.86.0-2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-debuginfo-0:7.86.0-2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-devel-0:7.86.0-2.el8jbcs.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:8840" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-99.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-curl-0:7.86.0-2.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-curl-0:7.86.0-2.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.86.0-2.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.51-37.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.51-37.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.51-37.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.51-37.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.51-37.el7jbcs.noarch", "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.51-37.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.51-37.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-0:7.86.0-2.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.86.0-2.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-20.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-20.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.19-20.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-44.redhat_1.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-44.redhat_1.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-44.redhat_1.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.51-37.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.4.0-18.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.4.0-18.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.4.0-18.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.17-13.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.17-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-debuginfo-0:1.3.17-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.51-37.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.3-22.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.3-22.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.3-22.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.51-37.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.51-37.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.43.0-11.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.43.0-11.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.43.0-11.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.43.0-11.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1k-13.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1k-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-17.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-17.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-17.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1k-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1k-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1k-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1k-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-32.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-32.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-32.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-static-1:1.1.1k-13.el7jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.1-99.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-ldap-debuginfo-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-mysql-debuginfo-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-nss-debuginfo-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-odbc-debuginfo-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-openssl-debuginfo-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-pgsql-debuginfo-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-sqlite-debuginfo-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-curl-0:7.86.0-2.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-curl-0:7.86.0-2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-curl-debuginfo-0:7.86.0-2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.51-37.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-devel-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-manual-0:2.4.51-37.el8jbcs.noarch", "8Base-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-debuginfo-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-0:7.86.0-2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-debuginfo-0:7.86.0-2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-devel-0:7.86.0-2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-20.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-20.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.19-20.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-44.redhat_1.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-44.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-debuginfo-0:1.2.48-44.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-debuginfo-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.4.0-18.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.4.0-18.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.4.0-18.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.17-13.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.17-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-debuginfo-0:1.3.17-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-debuginfo-1:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.3-22.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.3-22.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.3-22.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-debuginfo-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-1:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-debuginfo-1:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-0:1.43.0-11.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-nghttp2-0:1.43.0-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.43.0-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-devel-0:1.43.0-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-1:1.1.1k-13.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-1:1.1.1k-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-17.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-17.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-17.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1k-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1k-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1k-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-libs-debuginfo-1:1.1.1k-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1k-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-32.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-32.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-32.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-static-1:1.1.1k-13.el8jbcs.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "curl: CERTINFO never-ending busy-loop" }, { "cve": "CVE-2022-28614", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2022-06-08T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-99.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-curl-0:7.86.0-2.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-curl-0:7.86.0-2.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.86.0-2.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-0:7.86.0-2.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.86.0-2.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-20.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-20.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.19-20.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-44.redhat_1.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-44.redhat_1.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-44.redhat_1.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.4.0-18.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.4.0-18.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.4.0-18.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.17-13.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.17-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-debuginfo-0:1.3.17-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.3-22.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.3-22.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.3-22.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.43.0-11.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.43.0-11.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.43.0-11.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.43.0-11.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1k-13.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1k-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-17.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-17.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-17.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1k-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1k-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1k-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1k-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-32.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-32.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-32.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-static-1:1.1.1k-13.el7jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.1-99.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-ldap-debuginfo-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-mysql-debuginfo-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-nss-debuginfo-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-odbc-debuginfo-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-openssl-debuginfo-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-pgsql-debuginfo-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-sqlite-debuginfo-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-curl-0:7.86.0-2.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-curl-0:7.86.0-2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-curl-debuginfo-0:7.86.0-2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-0:7.86.0-2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-debuginfo-0:7.86.0-2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-devel-0:7.86.0-2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-20.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-20.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.19-20.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-44.redhat_1.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-44.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-debuginfo-0:1.2.48-44.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.4.0-18.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.4.0-18.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.4.0-18.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.17-13.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.17-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-debuginfo-0:1.3.17-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.3-22.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.3-22.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.3-22.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-0:1.43.0-11.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-nghttp2-0:1.43.0-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.43.0-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-devel-0:1.43.0-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-1:1.1.1k-13.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-1:1.1.1k-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-17.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-17.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-17.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1k-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1k-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1k-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-libs-debuginfo-1:1.1.1k-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1k-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-32.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-32.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-32.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-static-1:1.1.1k-13.el8jbcs.x86_64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2095002" } ], "notes": [ { "category": "description", "text": "An out-of-bounds read vulnerability was found in httpd. A very large input to the ap_rputs and ap_rwrite functions can lead to an integer overflow and result in an out-of-bounds read.", "title": "Vulnerability description" }, { "category": "summary", "text": "httpd: Out-of-bounds read via ap_rwrite()", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.51-37.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.51-37.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.51-37.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.51-37.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.51-37.el7jbcs.noarch", "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.51-37.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.51-37.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.51-37.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.51-37.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.51-37.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.51-37.el7jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.51-37.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-devel-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-manual-0:2.4.51-37.el8jbcs.noarch", "8Base-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-debuginfo-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-debuginfo-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-debuginfo-1:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-debuginfo-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-1:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-debuginfo-1:2.4.51-37.el8jbcs.x86_64" ], "known_not_affected": [ "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-99.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-curl-0:7.86.0-2.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-curl-0:7.86.0-2.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.86.0-2.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-0:7.86.0-2.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.86.0-2.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-20.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-20.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.19-20.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-44.redhat_1.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-44.redhat_1.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-44.redhat_1.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.4.0-18.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.4.0-18.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.4.0-18.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.17-13.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.17-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-debuginfo-0:1.3.17-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.3-22.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.3-22.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.3-22.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.43.0-11.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.43.0-11.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.43.0-11.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.43.0-11.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1k-13.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1k-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-17.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-17.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-17.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1k-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1k-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1k-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1k-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-32.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-32.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-32.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-static-1:1.1.1k-13.el7jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.1-99.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-ldap-debuginfo-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-mysql-debuginfo-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-nss-debuginfo-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-odbc-debuginfo-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-openssl-debuginfo-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-pgsql-debuginfo-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-sqlite-debuginfo-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-curl-0:7.86.0-2.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-curl-0:7.86.0-2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-curl-debuginfo-0:7.86.0-2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-0:7.86.0-2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-debuginfo-0:7.86.0-2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-devel-0:7.86.0-2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-20.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-20.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.19-20.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-44.redhat_1.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-44.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-debuginfo-0:1.2.48-44.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.4.0-18.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.4.0-18.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.4.0-18.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.17-13.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.17-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-debuginfo-0:1.3.17-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.3-22.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.3-22.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.3-22.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-0:1.43.0-11.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-nghttp2-0:1.43.0-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.43.0-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-devel-0:1.43.0-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-1:1.1.1k-13.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-1:1.1.1k-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-17.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-17.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-17.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1k-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1k-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1k-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-libs-debuginfo-1:1.1.1k-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1k-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-32.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-32.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-32.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-static-1:1.1.1k-13.el8jbcs.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-28614" }, { "category": "external", "summary": "RHBZ#2095002", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2095002" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-28614", "url": "https://www.cve.org/CVERecord?id=CVE-2022-28614" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-28614", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-28614" }, { "category": "external", "summary": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2022-28614", "url": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2022-28614" } ], "release_date": "2022-06-08T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-12-08T13:08:14+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nApplications using the APR libraries, such as httpd, must be restarted for this update to take effect. After installing the updated packages, the httpd daemon will be restarted automatically.", "product_ids": [ "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.51-37.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.51-37.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.51-37.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.51-37.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.51-37.el7jbcs.noarch", "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.51-37.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.51-37.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.51-37.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.51-37.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.51-37.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.51-37.el7jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.51-37.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-devel-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-manual-0:2.4.51-37.el8jbcs.noarch", "8Base-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-debuginfo-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-debuginfo-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-debuginfo-1:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-debuginfo-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-1:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-debuginfo-1:2.4.51-37.el8jbcs.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:8840" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-99.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-curl-0:7.86.0-2.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-curl-0:7.86.0-2.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.86.0-2.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.51-37.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.51-37.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.51-37.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.51-37.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.51-37.el7jbcs.noarch", "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.51-37.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.51-37.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-0:7.86.0-2.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.86.0-2.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-20.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-20.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.19-20.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-44.redhat_1.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-44.redhat_1.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-44.redhat_1.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.51-37.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.4.0-18.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.4.0-18.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.4.0-18.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.17-13.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.17-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-debuginfo-0:1.3.17-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.51-37.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.3-22.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.3-22.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.3-22.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.51-37.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.51-37.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.43.0-11.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.43.0-11.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.43.0-11.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.43.0-11.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1k-13.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1k-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-17.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-17.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-17.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1k-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1k-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1k-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1k-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-32.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-32.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-32.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-static-1:1.1.1k-13.el7jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.1-99.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-ldap-debuginfo-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-mysql-debuginfo-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-nss-debuginfo-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-odbc-debuginfo-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-openssl-debuginfo-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-pgsql-debuginfo-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-sqlite-debuginfo-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-curl-0:7.86.0-2.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-curl-0:7.86.0-2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-curl-debuginfo-0:7.86.0-2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.51-37.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-devel-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-manual-0:2.4.51-37.el8jbcs.noarch", "8Base-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-debuginfo-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-0:7.86.0-2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-debuginfo-0:7.86.0-2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-devel-0:7.86.0-2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-20.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-20.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.19-20.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-44.redhat_1.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-44.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-debuginfo-0:1.2.48-44.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-debuginfo-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.4.0-18.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.4.0-18.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.4.0-18.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.17-13.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.17-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-debuginfo-0:1.3.17-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-debuginfo-1:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.3-22.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.3-22.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.3-22.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-debuginfo-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-1:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-debuginfo-1:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-0:1.43.0-11.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-nghttp2-0:1.43.0-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.43.0-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-devel-0:1.43.0-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-1:1.1.1k-13.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-1:1.1.1k-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-17.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-17.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-17.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1k-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1k-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1k-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-libs-debuginfo-1:1.1.1k-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1k-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-32.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-32.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-32.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-static-1:1.1.1k-13.el8jbcs.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "httpd: Out-of-bounds read via ap_rwrite()" }, { "cve": "CVE-2022-28615", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "discovery_date": "2022-06-08T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-99.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-curl-0:7.86.0-2.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-curl-0:7.86.0-2.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.86.0-2.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-0:7.86.0-2.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.86.0-2.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-20.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-20.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.19-20.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-44.redhat_1.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-44.redhat_1.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-44.redhat_1.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.4.0-18.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.4.0-18.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.4.0-18.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.17-13.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.17-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-debuginfo-0:1.3.17-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.3-22.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.3-22.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.3-22.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.43.0-11.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.43.0-11.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.43.0-11.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.43.0-11.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1k-13.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1k-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-17.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-17.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-17.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1k-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1k-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1k-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1k-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-32.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-32.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-32.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-static-1:1.1.1k-13.el7jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.1-99.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-ldap-debuginfo-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-mysql-debuginfo-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-nss-debuginfo-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-odbc-debuginfo-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-openssl-debuginfo-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-pgsql-debuginfo-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-sqlite-debuginfo-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-curl-0:7.86.0-2.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-curl-0:7.86.0-2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-curl-debuginfo-0:7.86.0-2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-0:7.86.0-2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-debuginfo-0:7.86.0-2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-devel-0:7.86.0-2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-20.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-20.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.19-20.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-44.redhat_1.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-44.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-debuginfo-0:1.2.48-44.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.4.0-18.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.4.0-18.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.4.0-18.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.17-13.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.17-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-debuginfo-0:1.3.17-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.3-22.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.3-22.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.3-22.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-0:1.43.0-11.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-nghttp2-0:1.43.0-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.43.0-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-devel-0:1.43.0-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-1:1.1.1k-13.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-1:1.1.1k-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-17.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-17.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-17.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1k-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1k-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1k-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-libs-debuginfo-1:1.1.1k-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1k-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-32.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-32.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-32.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-static-1:1.1.1k-13.el8jbcs.x86_64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2095006" } ], "notes": [ { "category": "description", "text": "An out-of-bounds read vulnerability was found in httpd. A very large input to the ap_strcmp_match function can lead to an integer overflow and result in an out-of-bounds read.", "title": "Vulnerability description" }, { "category": "summary", "text": "httpd: Out-of-bounds read in ap_strcmp_match()", "title": "Vulnerability summary" }, { "category": "other", "text": "According to upstream, no code distributed with the httpd server can exploit this flaw, however, third-party modules or Lua scripts that use the ap_strcmp_match function could potentially be affected.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.51-37.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.51-37.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.51-37.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.51-37.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.51-37.el7jbcs.noarch", "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.51-37.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.51-37.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.51-37.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.51-37.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.51-37.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.51-37.el7jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.51-37.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-devel-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-manual-0:2.4.51-37.el8jbcs.noarch", "8Base-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-debuginfo-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-debuginfo-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-debuginfo-1:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-debuginfo-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-1:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-debuginfo-1:2.4.51-37.el8jbcs.x86_64" ], "known_not_affected": [ "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-99.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-curl-0:7.86.0-2.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-curl-0:7.86.0-2.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.86.0-2.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-0:7.86.0-2.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.86.0-2.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-20.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-20.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.19-20.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-44.redhat_1.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-44.redhat_1.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-44.redhat_1.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.4.0-18.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.4.0-18.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.4.0-18.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.17-13.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.17-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-debuginfo-0:1.3.17-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.3-22.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.3-22.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.3-22.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.43.0-11.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.43.0-11.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.43.0-11.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.43.0-11.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1k-13.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1k-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-17.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-17.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-17.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1k-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1k-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1k-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1k-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-32.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-32.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-32.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-static-1:1.1.1k-13.el7jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.1-99.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-ldap-debuginfo-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-mysql-debuginfo-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-nss-debuginfo-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-odbc-debuginfo-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-openssl-debuginfo-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-pgsql-debuginfo-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-sqlite-debuginfo-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-curl-0:7.86.0-2.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-curl-0:7.86.0-2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-curl-debuginfo-0:7.86.0-2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-0:7.86.0-2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-debuginfo-0:7.86.0-2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-devel-0:7.86.0-2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-20.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-20.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.19-20.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-44.redhat_1.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-44.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-debuginfo-0:1.2.48-44.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.4.0-18.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.4.0-18.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.4.0-18.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.17-13.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.17-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-debuginfo-0:1.3.17-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.3-22.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.3-22.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.3-22.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-0:1.43.0-11.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-nghttp2-0:1.43.0-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.43.0-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-devel-0:1.43.0-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-1:1.1.1k-13.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-1:1.1.1k-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-17.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-17.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-17.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1k-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1k-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1k-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-libs-debuginfo-1:1.1.1k-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1k-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-32.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-32.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-32.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-static-1:1.1.1k-13.el8jbcs.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-28615" }, { "category": "external", "summary": "RHBZ#2095006", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2095006" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-28615", "url": "https://www.cve.org/CVERecord?id=CVE-2022-28615" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-28615", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-28615" }, { "category": "external", "summary": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2022-28615", "url": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2022-28615" } ], "release_date": "2022-06-08T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-12-08T13:08:14+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nApplications using the APR libraries, such as httpd, must be restarted for this update to take effect. After installing the updated packages, the httpd daemon will be restarted automatically.", "product_ids": [ "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.51-37.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.51-37.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.51-37.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.51-37.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.51-37.el7jbcs.noarch", "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.51-37.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.51-37.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.51-37.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.51-37.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.51-37.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.51-37.el7jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.51-37.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-devel-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-manual-0:2.4.51-37.el8jbcs.noarch", "8Base-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-debuginfo-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-debuginfo-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-debuginfo-1:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-debuginfo-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-1:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-debuginfo-1:2.4.51-37.el8jbcs.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:8840" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.4, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H", "version": "3.1" }, "products": [ "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-99.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-curl-0:7.86.0-2.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-curl-0:7.86.0-2.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.86.0-2.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.51-37.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.51-37.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.51-37.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.51-37.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.51-37.el7jbcs.noarch", "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.51-37.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.51-37.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-0:7.86.0-2.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.86.0-2.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-20.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-20.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.19-20.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-44.redhat_1.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-44.redhat_1.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-44.redhat_1.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.51-37.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.4.0-18.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.4.0-18.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.4.0-18.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.17-13.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.17-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-debuginfo-0:1.3.17-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.51-37.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.3-22.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.3-22.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.3-22.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.51-37.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.51-37.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.43.0-11.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.43.0-11.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.43.0-11.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.43.0-11.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1k-13.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1k-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-17.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-17.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-17.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1k-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1k-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1k-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1k-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-32.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-32.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-32.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-static-1:1.1.1k-13.el7jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.1-99.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-ldap-debuginfo-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-mysql-debuginfo-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-nss-debuginfo-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-odbc-debuginfo-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-openssl-debuginfo-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-pgsql-debuginfo-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-sqlite-debuginfo-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-curl-0:7.86.0-2.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-curl-0:7.86.0-2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-curl-debuginfo-0:7.86.0-2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.51-37.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-devel-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-manual-0:2.4.51-37.el8jbcs.noarch", "8Base-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-debuginfo-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-0:7.86.0-2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-debuginfo-0:7.86.0-2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-devel-0:7.86.0-2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-20.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-20.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.19-20.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-44.redhat_1.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-44.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-debuginfo-0:1.2.48-44.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-debuginfo-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.4.0-18.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.4.0-18.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.4.0-18.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.17-13.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.17-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-debuginfo-0:1.3.17-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-debuginfo-1:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.3-22.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.3-22.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.3-22.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-debuginfo-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-1:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-debuginfo-1:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-0:1.43.0-11.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-nghttp2-0:1.43.0-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.43.0-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-devel-0:1.43.0-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-1:1.1.1k-13.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-1:1.1.1k-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-17.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-17.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-17.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1k-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1k-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1k-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-libs-debuginfo-1:1.1.1k-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1k-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-32.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-32.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-32.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-static-1:1.1.1k-13.el8jbcs.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "httpd: Out-of-bounds read in ap_strcmp_match()" }, { "cve": "CVE-2022-30522", "cwe": { "id": "CWE-789", "name": "Memory Allocation with Excessive Size Value" }, "discovery_date": "2022-06-08T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-99.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-curl-0:7.86.0-2.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-curl-0:7.86.0-2.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.86.0-2.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-0:7.86.0-2.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.86.0-2.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-20.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-20.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.19-20.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-44.redhat_1.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-44.redhat_1.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-44.redhat_1.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.4.0-18.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.4.0-18.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.4.0-18.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.17-13.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.17-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-debuginfo-0:1.3.17-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.3-22.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.3-22.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.3-22.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.43.0-11.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.43.0-11.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.43.0-11.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.43.0-11.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1k-13.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1k-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-17.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-17.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-17.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1k-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1k-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1k-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1k-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-32.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-32.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-32.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-static-1:1.1.1k-13.el7jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.1-99.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-ldap-debuginfo-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-mysql-debuginfo-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-nss-debuginfo-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-odbc-debuginfo-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-openssl-debuginfo-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-pgsql-debuginfo-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-sqlite-debuginfo-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-curl-0:7.86.0-2.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-curl-0:7.86.0-2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-curl-debuginfo-0:7.86.0-2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-0:7.86.0-2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-debuginfo-0:7.86.0-2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-devel-0:7.86.0-2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-20.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-20.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.19-20.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-44.redhat_1.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-44.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-debuginfo-0:1.2.48-44.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.4.0-18.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.4.0-18.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.4.0-18.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.17-13.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.17-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-debuginfo-0:1.3.17-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.3-22.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.3-22.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.3-22.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-0:1.43.0-11.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-nghttp2-0:1.43.0-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.43.0-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-devel-0:1.43.0-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-1:1.1.1k-13.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-1:1.1.1k-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-17.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-17.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-17.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1k-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1k-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1k-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-libs-debuginfo-1:1.1.1k-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1k-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-32.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-32.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-32.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-static-1:1.1.1k-13.el8jbcs.x86_64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2095015" } ], "notes": [ { "category": "description", "text": "A flaw was found in the mod_sed module of httpd. A very large input to the mod_sed module can result in a denial of service due to excessively large memory allocations.", "title": "Vulnerability description" }, { "category": "summary", "text": "httpd: mod_sed: DoS vulnerability", "title": "Vulnerability summary" }, { "category": "other", "text": "The mod_sed module is disabled by default on Red Hat Enterprise Linux 7 and 8. The httpd package as shipped with Red Hat Enterprise Linux 6 is not affected by this flaw because the mod_sed module is not available.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.51-37.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.51-37.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.51-37.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.51-37.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.51-37.el7jbcs.noarch", "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.51-37.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.51-37.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.51-37.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.51-37.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.51-37.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.51-37.el7jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.51-37.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-devel-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-manual-0:2.4.51-37.el8jbcs.noarch", "8Base-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-debuginfo-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-debuginfo-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-debuginfo-1:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-debuginfo-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-1:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-debuginfo-1:2.4.51-37.el8jbcs.x86_64" ], "known_not_affected": [ "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-99.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-curl-0:7.86.0-2.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-curl-0:7.86.0-2.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.86.0-2.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-0:7.86.0-2.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.86.0-2.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-20.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-20.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.19-20.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-44.redhat_1.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-44.redhat_1.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-44.redhat_1.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.4.0-18.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.4.0-18.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.4.0-18.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.17-13.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.17-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-debuginfo-0:1.3.17-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.3-22.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.3-22.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.3-22.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.43.0-11.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.43.0-11.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.43.0-11.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.43.0-11.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1k-13.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1k-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-17.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-17.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-17.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1k-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1k-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1k-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1k-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-32.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-32.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-32.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-static-1:1.1.1k-13.el7jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.1-99.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-ldap-debuginfo-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-mysql-debuginfo-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-nss-debuginfo-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-odbc-debuginfo-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-openssl-debuginfo-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-pgsql-debuginfo-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-sqlite-debuginfo-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-curl-0:7.86.0-2.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-curl-0:7.86.0-2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-curl-debuginfo-0:7.86.0-2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-0:7.86.0-2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-debuginfo-0:7.86.0-2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-devel-0:7.86.0-2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-20.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-20.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.19-20.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-44.redhat_1.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-44.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-debuginfo-0:1.2.48-44.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.4.0-18.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.4.0-18.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.4.0-18.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.17-13.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.17-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-debuginfo-0:1.3.17-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.3-22.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.3-22.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.3-22.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-0:1.43.0-11.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-nghttp2-0:1.43.0-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.43.0-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-devel-0:1.43.0-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-1:1.1.1k-13.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-1:1.1.1k-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-17.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-17.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-17.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1k-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1k-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1k-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-libs-debuginfo-1:1.1.1k-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1k-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-32.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-32.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-32.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-static-1:1.1.1k-13.el8jbcs.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-30522" }, { "category": "external", "summary": "RHBZ#2095015", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2095015" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-30522", "url": "https://www.cve.org/CVERecord?id=CVE-2022-30522" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-30522", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-30522" }, { "category": "external", "summary": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2022-30522", "url": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2022-30522" } ], "release_date": "2022-06-08T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-12-08T13:08:14+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nApplications using the APR libraries, such as httpd, must be restarted for this update to take effect. After installing the updated packages, the httpd daemon will be restarted automatically.", "product_ids": [ "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.51-37.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.51-37.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.51-37.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.51-37.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.51-37.el7jbcs.noarch", "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.51-37.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.51-37.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.51-37.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.51-37.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.51-37.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.51-37.el7jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.51-37.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-devel-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-manual-0:2.4.51-37.el8jbcs.noarch", "8Base-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-debuginfo-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-debuginfo-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-debuginfo-1:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-debuginfo-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-1:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-debuginfo-1:2.4.51-37.el8jbcs.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:8840" }, { "category": "workaround", "details": "Disabling mod_sed and restating httpd will mitigate this flaw.", "product_ids": [ "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-99.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-curl-0:7.86.0-2.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-curl-0:7.86.0-2.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.86.0-2.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.51-37.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.51-37.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.51-37.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.51-37.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.51-37.el7jbcs.noarch", "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.51-37.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.51-37.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-0:7.86.0-2.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.86.0-2.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-20.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-20.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.19-20.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-44.redhat_1.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-44.redhat_1.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-44.redhat_1.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.51-37.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.4.0-18.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.4.0-18.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.4.0-18.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.17-13.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.17-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-debuginfo-0:1.3.17-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.51-37.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.3-22.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.3-22.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.3-22.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.51-37.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.51-37.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.43.0-11.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.43.0-11.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.43.0-11.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.43.0-11.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1k-13.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1k-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-17.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-17.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-17.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1k-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1k-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1k-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1k-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-32.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-32.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-32.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-static-1:1.1.1k-13.el7jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.1-99.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-ldap-debuginfo-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-mysql-debuginfo-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-nss-debuginfo-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-odbc-debuginfo-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-openssl-debuginfo-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-pgsql-debuginfo-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-sqlite-debuginfo-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-curl-0:7.86.0-2.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-curl-0:7.86.0-2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-curl-debuginfo-0:7.86.0-2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.51-37.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-devel-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-manual-0:2.4.51-37.el8jbcs.noarch", "8Base-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-debuginfo-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-0:7.86.0-2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-debuginfo-0:7.86.0-2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-devel-0:7.86.0-2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-20.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-20.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.19-20.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-44.redhat_1.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-44.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-debuginfo-0:1.2.48-44.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-debuginfo-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.4.0-18.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.4.0-18.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.4.0-18.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.17-13.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.17-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-debuginfo-0:1.3.17-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-debuginfo-1:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.3-22.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.3-22.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.3-22.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-debuginfo-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-1:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-debuginfo-1:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-0:1.43.0-11.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-nghttp2-0:1.43.0-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.43.0-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-devel-0:1.43.0-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-1:1.1.1k-13.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-1:1.1.1k-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-17.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-17.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-17.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1k-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1k-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1k-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-libs-debuginfo-1:1.1.1k-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1k-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-32.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-32.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-32.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-static-1:1.1.1k-13.el8jbcs.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-99.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-curl-0:7.86.0-2.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-curl-0:7.86.0-2.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.86.0-2.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.51-37.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.51-37.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.51-37.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.51-37.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.51-37.el7jbcs.noarch", "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.51-37.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.51-37.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-0:7.86.0-2.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.86.0-2.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-20.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-20.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.19-20.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-44.redhat_1.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-44.redhat_1.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-44.redhat_1.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.51-37.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.4.0-18.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.4.0-18.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.4.0-18.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.17-13.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.17-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-debuginfo-0:1.3.17-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.51-37.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.3-22.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.3-22.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.3-22.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.51-37.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.51-37.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.43.0-11.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.43.0-11.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.43.0-11.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.43.0-11.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1k-13.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1k-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-17.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-17.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-17.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1k-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1k-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1k-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1k-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-32.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-32.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-32.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-static-1:1.1.1k-13.el7jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.1-99.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-ldap-debuginfo-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-mysql-debuginfo-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-nss-debuginfo-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-odbc-debuginfo-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-openssl-debuginfo-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-pgsql-debuginfo-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-sqlite-debuginfo-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-curl-0:7.86.0-2.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-curl-0:7.86.0-2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-curl-debuginfo-0:7.86.0-2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.51-37.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-devel-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-manual-0:2.4.51-37.el8jbcs.noarch", "8Base-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-debuginfo-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-0:7.86.0-2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-debuginfo-0:7.86.0-2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-devel-0:7.86.0-2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-20.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-20.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.19-20.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-44.redhat_1.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-44.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-debuginfo-0:1.2.48-44.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-debuginfo-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.4.0-18.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.4.0-18.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.4.0-18.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.17-13.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.17-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-debuginfo-0:1.3.17-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-debuginfo-1:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.3-22.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.3-22.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.3-22.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-debuginfo-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-1:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-debuginfo-1:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-0:1.43.0-11.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-nghttp2-0:1.43.0-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.43.0-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-devel-0:1.43.0-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-1:1.1.1k-13.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-1:1.1.1k-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-17.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-17.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-17.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1k-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1k-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1k-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-libs-debuginfo-1:1.1.1k-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1k-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-32.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-32.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-32.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-static-1:1.1.1k-13.el8jbcs.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "httpd: mod_sed: DoS vulnerability" }, { "cve": "CVE-2022-31813", "cwe": { "id": "CWE-348", "name": "Use of Less Trusted Source" }, "discovery_date": "2022-06-08T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-99.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-curl-0:7.86.0-2.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-curl-0:7.86.0-2.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.86.0-2.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-0:7.86.0-2.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.86.0-2.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-44.redhat_1.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-44.redhat_1.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-44.redhat_1.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.4.0-18.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.4.0-18.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.4.0-18.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.17-13.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.17-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-debuginfo-0:1.3.17-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.3-22.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.3-22.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.3-22.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.43.0-11.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.43.0-11.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.43.0-11.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.43.0-11.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1k-13.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1k-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-17.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-17.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-17.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1k-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1k-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1k-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1k-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-32.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-32.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-32.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-static-1:1.1.1k-13.el7jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.1-99.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-ldap-debuginfo-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-mysql-debuginfo-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-nss-debuginfo-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-odbc-debuginfo-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-openssl-debuginfo-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-pgsql-debuginfo-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-sqlite-debuginfo-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-curl-0:7.86.0-2.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-curl-0:7.86.0-2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-curl-debuginfo-0:7.86.0-2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-0:7.86.0-2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-debuginfo-0:7.86.0-2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-devel-0:7.86.0-2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-44.redhat_1.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-44.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-debuginfo-0:1.2.48-44.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.4.0-18.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.4.0-18.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.4.0-18.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.17-13.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.17-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-debuginfo-0:1.3.17-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.3-22.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.3-22.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.3-22.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-0:1.43.0-11.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-nghttp2-0:1.43.0-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.43.0-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-devel-0:1.43.0-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-1:1.1.1k-13.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-1:1.1.1k-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-17.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-17.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-17.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1k-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1k-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1k-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-libs-debuginfo-1:1.1.1k-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1k-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-32.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-32.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-32.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-static-1:1.1.1k-13.el8jbcs.x86_64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2095020" } ], "notes": [ { "category": "description", "text": "A flaw was found in the mod_proxy module of httpd. The server may remove the X-Forwarded-* headers from a request based on the client-side Connection header hop-by-hop mechanism.", "title": "Vulnerability description" }, { "category": "summary", "text": "httpd: mod_proxy: X-Forwarded-For dropped by hop-by-hop mechanism", "title": "Vulnerability summary" }, { "category": "other", "text": "This flaw has been rated as having a security impact of Moderate, and is not currently planned to be addressed in future updates of Red Hat Enterprise Linux 7. Red Hat Enterprise Linux 7 is now in Maintenance Support 2 Phase of the support and maintenance life cycle. For additional information, refer to the Red Hat Enterprise Linux Life Cycle: https://access.redhat.com/support/policy/updates/errata.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.51-37.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.51-37.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.51-37.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.51-37.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.51-37.el7jbcs.noarch", "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.51-37.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.51-37.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-20.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-20.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.19-20.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.51-37.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.51-37.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.51-37.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.51-37.el7jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.51-37.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-devel-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-manual-0:2.4.51-37.el8jbcs.noarch", "8Base-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-debuginfo-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-20.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-20.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.19-20.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-debuginfo-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-debuginfo-1:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-debuginfo-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-1:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-debuginfo-1:2.4.51-37.el8jbcs.x86_64" ], "known_not_affected": [ "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-99.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-curl-0:7.86.0-2.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-curl-0:7.86.0-2.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.86.0-2.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-0:7.86.0-2.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.86.0-2.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-44.redhat_1.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-44.redhat_1.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-44.redhat_1.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.4.0-18.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.4.0-18.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.4.0-18.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.17-13.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.17-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-debuginfo-0:1.3.17-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.3-22.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.3-22.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.3-22.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.43.0-11.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.43.0-11.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.43.0-11.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.43.0-11.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1k-13.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1k-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-17.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-17.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-17.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1k-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1k-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1k-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1k-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-32.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-32.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-32.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-static-1:1.1.1k-13.el7jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.1-99.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-ldap-debuginfo-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-mysql-debuginfo-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-nss-debuginfo-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-odbc-debuginfo-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-openssl-debuginfo-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-pgsql-debuginfo-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-sqlite-debuginfo-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-curl-0:7.86.0-2.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-curl-0:7.86.0-2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-curl-debuginfo-0:7.86.0-2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-0:7.86.0-2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-debuginfo-0:7.86.0-2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-devel-0:7.86.0-2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-44.redhat_1.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-44.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-debuginfo-0:1.2.48-44.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.4.0-18.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.4.0-18.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.4.0-18.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.17-13.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.17-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-debuginfo-0:1.3.17-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.3-22.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.3-22.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.3-22.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-0:1.43.0-11.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-nghttp2-0:1.43.0-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.43.0-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-devel-0:1.43.0-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-1:1.1.1k-13.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-1:1.1.1k-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-17.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-17.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-17.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1k-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1k-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1k-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-libs-debuginfo-1:1.1.1k-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1k-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-32.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-32.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-32.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-static-1:1.1.1k-13.el8jbcs.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-31813" }, { "category": "external", "summary": "RHBZ#2095020", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2095020" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-31813", "url": "https://www.cve.org/CVERecord?id=CVE-2022-31813" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-31813", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-31813" }, { "category": "external", "summary": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2022-31813", "url": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2022-31813" } ], "release_date": "2022-06-08T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-12-08T13:08:14+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nApplications using the APR libraries, such as httpd, must be restarted for this update to take effect. After installing the updated packages, the httpd daemon will be restarted automatically.", "product_ids": [ "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.51-37.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.51-37.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.51-37.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.51-37.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.51-37.el7jbcs.noarch", "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.51-37.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.51-37.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-20.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-20.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.19-20.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.51-37.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.51-37.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.51-37.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.51-37.el7jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.51-37.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-devel-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-manual-0:2.4.51-37.el8jbcs.noarch", "8Base-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-debuginfo-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-20.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-20.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.19-20.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-debuginfo-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-debuginfo-1:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-debuginfo-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-1:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-debuginfo-1:2.4.51-37.el8jbcs.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:8840" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-99.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-curl-0:7.86.0-2.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-curl-0:7.86.0-2.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.86.0-2.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.51-37.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.51-37.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.51-37.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.51-37.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.51-37.el7jbcs.noarch", "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.51-37.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.51-37.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-0:7.86.0-2.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.86.0-2.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-20.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-20.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.19-20.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-44.redhat_1.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-44.redhat_1.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-44.redhat_1.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.51-37.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.4.0-18.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.4.0-18.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.4.0-18.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.17-13.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.17-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-debuginfo-0:1.3.17-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.51-37.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.3-22.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.3-22.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.3-22.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.51-37.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.51-37.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.43.0-11.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.43.0-11.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.43.0-11.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.43.0-11.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1k-13.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1k-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-17.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-17.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-17.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1k-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1k-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1k-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1k-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-32.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-32.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-32.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-static-1:1.1.1k-13.el7jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.1-99.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-ldap-debuginfo-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-mysql-debuginfo-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-nss-debuginfo-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-odbc-debuginfo-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-openssl-debuginfo-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-pgsql-debuginfo-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-sqlite-debuginfo-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-curl-0:7.86.0-2.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-curl-0:7.86.0-2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-curl-debuginfo-0:7.86.0-2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.51-37.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-devel-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-manual-0:2.4.51-37.el8jbcs.noarch", "8Base-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-debuginfo-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-0:7.86.0-2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-debuginfo-0:7.86.0-2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-devel-0:7.86.0-2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-20.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-20.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.19-20.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-44.redhat_1.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-44.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-debuginfo-0:1.2.48-44.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-debuginfo-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.4.0-18.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.4.0-18.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.4.0-18.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.17-13.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.17-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-debuginfo-0:1.3.17-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-debuginfo-1:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.3-22.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.3-22.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.3-22.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-debuginfo-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-1:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-debuginfo-1:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-0:1.43.0-11.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-nghttp2-0:1.43.0-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.43.0-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-devel-0:1.43.0-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-1:1.1.1k-13.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-1:1.1.1k-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-17.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-17.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-17.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1k-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1k-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1k-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-libs-debuginfo-1:1.1.1k-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1k-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-32.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-32.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-32.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-static-1:1.1.1k-13.el8jbcs.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 7.3, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" }, "products": [ "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-99.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-curl-0:7.86.0-2.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-curl-0:7.86.0-2.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.86.0-2.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.51-37.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.51-37.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.51-37.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.51-37.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.51-37.el7jbcs.noarch", "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.51-37.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.51-37.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-0:7.86.0-2.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.86.0-2.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-20.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-20.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.19-20.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-44.redhat_1.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-44.redhat_1.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-44.redhat_1.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.51-37.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.4.0-18.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.4.0-18.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.4.0-18.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.17-13.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.17-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-debuginfo-0:1.3.17-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.51-37.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.3-22.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.3-22.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.3-22.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.51-37.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.51-37.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.43.0-11.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.43.0-11.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.43.0-11.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.43.0-11.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1k-13.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1k-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-17.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-17.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-17.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1k-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1k-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1k-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1k-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-32.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-32.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-32.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-static-1:1.1.1k-13.el7jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.1-99.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-ldap-debuginfo-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-mysql-debuginfo-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-nss-debuginfo-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-odbc-debuginfo-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-openssl-debuginfo-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-pgsql-debuginfo-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-sqlite-debuginfo-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-curl-0:7.86.0-2.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-curl-0:7.86.0-2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-curl-debuginfo-0:7.86.0-2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.51-37.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-devel-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-manual-0:2.4.51-37.el8jbcs.noarch", "8Base-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-debuginfo-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-0:7.86.0-2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-debuginfo-0:7.86.0-2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-devel-0:7.86.0-2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-20.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-20.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.19-20.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-44.redhat_1.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-44.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-debuginfo-0:1.2.48-44.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-debuginfo-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.4.0-18.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.4.0-18.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.4.0-18.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.17-13.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.17-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-debuginfo-0:1.3.17-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-debuginfo-1:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.3-22.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.3-22.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.3-22.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-debuginfo-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-1:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-debuginfo-1:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-0:1.43.0-11.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-nghttp2-0:1.43.0-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.43.0-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-devel-0:1.43.0-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-1:1.1.1k-13.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-1:1.1.1k-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-17.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-17.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-17.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1k-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1k-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1k-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-libs-debuginfo-1:1.1.1k-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1k-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-32.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-32.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-32.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-static-1:1.1.1k-13.el8jbcs.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "httpd: mod_proxy: X-Forwarded-For dropped by hop-by-hop mechanism" }, { "cve": "CVE-2022-32206", "cwe": { "id": "CWE-770", "name": "Allocation of Resources Without Limits or Throttling" }, "discovery_date": "2022-06-20T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-99.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.51-37.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.51-37.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.51-37.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.51-37.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.51-37.el7jbcs.noarch", "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.51-37.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.51-37.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-20.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-20.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.19-20.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-44.redhat_1.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-44.redhat_1.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-44.redhat_1.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.51-37.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.4.0-18.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.4.0-18.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.4.0-18.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.17-13.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.17-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-debuginfo-0:1.3.17-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.51-37.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.3-22.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.3-22.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.3-22.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.51-37.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.51-37.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.43.0-11.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.43.0-11.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.43.0-11.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.43.0-11.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1k-13.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1k-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-17.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-17.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-17.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1k-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1k-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1k-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1k-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-32.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-32.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-32.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-static-1:1.1.1k-13.el7jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.1-99.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-ldap-debuginfo-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-mysql-debuginfo-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-nss-debuginfo-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-odbc-debuginfo-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-openssl-debuginfo-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-pgsql-debuginfo-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-sqlite-debuginfo-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.51-37.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-devel-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-manual-0:2.4.51-37.el8jbcs.noarch", "8Base-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-debuginfo-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-20.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-20.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.19-20.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-44.redhat_1.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-44.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-debuginfo-0:1.2.48-44.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-debuginfo-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.4.0-18.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.4.0-18.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.4.0-18.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.17-13.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.17-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-debuginfo-0:1.3.17-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-debuginfo-1:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.3-22.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.3-22.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.3-22.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-debuginfo-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-1:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-debuginfo-1:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-0:1.43.0-11.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-nghttp2-0:1.43.0-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.43.0-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-devel-0:1.43.0-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-1:1.1.1k-13.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-1:1.1.1k-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-17.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-17.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-17.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1k-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1k-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1k-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-libs-debuginfo-1:1.1.1k-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1k-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-32.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-32.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-32.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-static-1:1.1.1k-13.el8jbcs.x86_64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2099300" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in curl. This issue occurs because the number of acceptable \"links\" in the \"decompression chain\" was unbounded, allowing a malicious server to insert a virtually unlimited number of compression steps. This flaw leads to a denial of service, either by mistake or by a malicious actor.", "title": "Vulnerability description" }, { "category": "summary", "text": "curl: HTTP compression denial of service", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-JBCS:jbcs-httpd24-curl-0:7.86.0-2.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-curl-0:7.86.0-2.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.86.0-2.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-0:7.86.0-2.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.86.0-2.el7jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-curl-0:7.86.0-2.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-curl-0:7.86.0-2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-curl-debuginfo-0:7.86.0-2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-0:7.86.0-2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-debuginfo-0:7.86.0-2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-devel-0:7.86.0-2.el8jbcs.x86_64" ], "known_not_affected": [ "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-99.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.51-37.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.51-37.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.51-37.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.51-37.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.51-37.el7jbcs.noarch", "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.51-37.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.51-37.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-20.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-20.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.19-20.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-44.redhat_1.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-44.redhat_1.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-44.redhat_1.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.51-37.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.4.0-18.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.4.0-18.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.4.0-18.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.17-13.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.17-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-debuginfo-0:1.3.17-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.51-37.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.3-22.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.3-22.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.3-22.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.51-37.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.51-37.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.43.0-11.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.43.0-11.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.43.0-11.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.43.0-11.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1k-13.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1k-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-17.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-17.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-17.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1k-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1k-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1k-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1k-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-32.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-32.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-32.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-static-1:1.1.1k-13.el7jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.1-99.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-ldap-debuginfo-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-mysql-debuginfo-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-nss-debuginfo-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-odbc-debuginfo-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-openssl-debuginfo-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-pgsql-debuginfo-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-sqlite-debuginfo-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.51-37.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-devel-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-manual-0:2.4.51-37.el8jbcs.noarch", "8Base-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-debuginfo-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-20.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-20.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.19-20.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-44.redhat_1.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-44.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-debuginfo-0:1.2.48-44.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-debuginfo-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.4.0-18.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.4.0-18.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.4.0-18.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.17-13.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.17-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-debuginfo-0:1.3.17-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-debuginfo-1:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.3-22.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.3-22.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.3-22.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-debuginfo-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-1:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-debuginfo-1:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-0:1.43.0-11.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-nghttp2-0:1.43.0-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.43.0-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-devel-0:1.43.0-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-1:1.1.1k-13.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-1:1.1.1k-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-17.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-17.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-17.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1k-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1k-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1k-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-libs-debuginfo-1:1.1.1k-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1k-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-32.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-32.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-32.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-static-1:1.1.1k-13.el8jbcs.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-32206" }, { "category": "external", "summary": "RHBZ#2099300", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2099300" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-32206", "url": "https://www.cve.org/CVERecord?id=CVE-2022-32206" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-32206", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-32206" }, { "category": "external", "summary": "https://curl.se/docs/CVE-2022-32206.html", "url": "https://curl.se/docs/CVE-2022-32206.html" } ], "release_date": "2022-06-27T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-12-08T13:08:14+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nApplications using the APR libraries, such as httpd, must be restarted for this update to take effect. After installing the updated packages, the httpd daemon will be restarted automatically.", "product_ids": [ "7Server-JBCS:jbcs-httpd24-curl-0:7.86.0-2.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-curl-0:7.86.0-2.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.86.0-2.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-0:7.86.0-2.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.86.0-2.el7jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-curl-0:7.86.0-2.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-curl-0:7.86.0-2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-curl-debuginfo-0:7.86.0-2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-0:7.86.0-2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-debuginfo-0:7.86.0-2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-devel-0:7.86.0-2.el8jbcs.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:8840" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-99.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-curl-0:7.86.0-2.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-curl-0:7.86.0-2.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.86.0-2.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.51-37.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.51-37.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.51-37.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.51-37.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.51-37.el7jbcs.noarch", "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.51-37.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.51-37.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-0:7.86.0-2.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.86.0-2.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-20.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-20.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.19-20.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-44.redhat_1.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-44.redhat_1.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-44.redhat_1.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.51-37.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.4.0-18.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.4.0-18.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.4.0-18.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.17-13.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.17-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-debuginfo-0:1.3.17-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.51-37.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.3-22.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.3-22.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.3-22.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.51-37.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.51-37.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.43.0-11.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.43.0-11.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.43.0-11.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.43.0-11.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1k-13.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1k-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-17.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-17.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-17.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1k-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1k-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1k-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1k-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-32.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-32.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-32.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-static-1:1.1.1k-13.el7jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.1-99.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-ldap-debuginfo-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-mysql-debuginfo-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-nss-debuginfo-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-odbc-debuginfo-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-openssl-debuginfo-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-pgsql-debuginfo-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-sqlite-debuginfo-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-curl-0:7.86.0-2.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-curl-0:7.86.0-2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-curl-debuginfo-0:7.86.0-2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.51-37.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-devel-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-manual-0:2.4.51-37.el8jbcs.noarch", "8Base-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-debuginfo-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-0:7.86.0-2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-debuginfo-0:7.86.0-2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-devel-0:7.86.0-2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-20.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-20.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.19-20.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-44.redhat_1.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-44.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-debuginfo-0:1.2.48-44.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-debuginfo-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.4.0-18.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.4.0-18.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.4.0-18.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.17-13.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.17-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-debuginfo-0:1.3.17-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-debuginfo-1:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.3-22.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.3-22.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.3-22.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-debuginfo-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-1:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-debuginfo-1:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-0:1.43.0-11.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-nghttp2-0:1.43.0-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.43.0-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-devel-0:1.43.0-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-1:1.1.1k-13.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-1:1.1.1k-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-17.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-17.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-17.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1k-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1k-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1k-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-libs-debuginfo-1:1.1.1k-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1k-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-32.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-32.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-32.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-static-1:1.1.1k-13.el8jbcs.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "curl: HTTP compression denial of service" }, { "cve": "CVE-2022-32207", "cwe": { "id": "CWE-281", "name": "Improper Preservation of Permissions" }, "discovery_date": "2022-06-20T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-99.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.51-37.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.51-37.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.51-37.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.51-37.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.51-37.el7jbcs.noarch", "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.51-37.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.51-37.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-20.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-20.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.19-20.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-44.redhat_1.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-44.redhat_1.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-44.redhat_1.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.51-37.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.4.0-18.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.4.0-18.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.4.0-18.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.17-13.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.17-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-debuginfo-0:1.3.17-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.51-37.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.3-22.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.3-22.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.3-22.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.51-37.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.51-37.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.43.0-11.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.43.0-11.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.43.0-11.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.43.0-11.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1k-13.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1k-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-17.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-17.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-17.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1k-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1k-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1k-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1k-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-32.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-32.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-32.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-static-1:1.1.1k-13.el7jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.1-99.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-ldap-debuginfo-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-mysql-debuginfo-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-nss-debuginfo-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-odbc-debuginfo-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-openssl-debuginfo-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-pgsql-debuginfo-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-sqlite-debuginfo-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.51-37.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-devel-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-manual-0:2.4.51-37.el8jbcs.noarch", "8Base-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-debuginfo-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-20.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-20.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.19-20.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-44.redhat_1.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-44.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-debuginfo-0:1.2.48-44.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-debuginfo-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.4.0-18.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.4.0-18.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.4.0-18.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.17-13.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.17-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-debuginfo-0:1.3.17-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-debuginfo-1:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.3-22.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.3-22.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.3-22.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-debuginfo-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-1:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-debuginfo-1:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-0:1.43.0-11.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-nghttp2-0:1.43.0-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.43.0-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-devel-0:1.43.0-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-1:1.1.1k-13.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-1:1.1.1k-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-17.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-17.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-17.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1k-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1k-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1k-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-libs-debuginfo-1:1.1.1k-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1k-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-32.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-32.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-32.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-static-1:1.1.1k-13.el8jbcs.x86_64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2099305" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in curl. This issue occurs because when curl saves cookies, alt-svc, and HSTS data to local files, it makes the operation atomic by finalizing the process with a rename from a temporary name to the final target file name. This flaw leads to unpreserved file permissions, either by mistake or by a malicious actor.", "title": "Vulnerability description" }, { "category": "summary", "text": "curl: Unpreserved file permissions", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-JBCS:jbcs-httpd24-curl-0:7.86.0-2.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-curl-0:7.86.0-2.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.86.0-2.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-0:7.86.0-2.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.86.0-2.el7jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-curl-0:7.86.0-2.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-curl-0:7.86.0-2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-curl-debuginfo-0:7.86.0-2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-0:7.86.0-2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-debuginfo-0:7.86.0-2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-devel-0:7.86.0-2.el8jbcs.x86_64" ], "known_not_affected": [ "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-99.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.51-37.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.51-37.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.51-37.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.51-37.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.51-37.el7jbcs.noarch", "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.51-37.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.51-37.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-20.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-20.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.19-20.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-44.redhat_1.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-44.redhat_1.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-44.redhat_1.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.51-37.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.4.0-18.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.4.0-18.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.4.0-18.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.17-13.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.17-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-debuginfo-0:1.3.17-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.51-37.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.3-22.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.3-22.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.3-22.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.51-37.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.51-37.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.43.0-11.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.43.0-11.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.43.0-11.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.43.0-11.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1k-13.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1k-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-17.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-17.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-17.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1k-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1k-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1k-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1k-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-32.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-32.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-32.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-static-1:1.1.1k-13.el7jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.1-99.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-ldap-debuginfo-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-mysql-debuginfo-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-nss-debuginfo-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-odbc-debuginfo-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-openssl-debuginfo-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-pgsql-debuginfo-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-sqlite-debuginfo-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.51-37.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-devel-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-manual-0:2.4.51-37.el8jbcs.noarch", "8Base-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-debuginfo-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-20.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-20.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.19-20.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-44.redhat_1.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-44.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-debuginfo-0:1.2.48-44.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-debuginfo-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.4.0-18.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.4.0-18.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.4.0-18.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.17-13.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.17-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-debuginfo-0:1.3.17-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-debuginfo-1:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.3-22.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.3-22.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.3-22.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-debuginfo-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-1:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-debuginfo-1:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-0:1.43.0-11.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-nghttp2-0:1.43.0-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.43.0-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-devel-0:1.43.0-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-1:1.1.1k-13.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-1:1.1.1k-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-17.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-17.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-17.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1k-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1k-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1k-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-libs-debuginfo-1:1.1.1k-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1k-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-32.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-32.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-32.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-static-1:1.1.1k-13.el8jbcs.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-32207" }, { "category": "external", "summary": "RHBZ#2099305", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2099305" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-32207", "url": "https://www.cve.org/CVERecord?id=CVE-2022-32207" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-32207", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-32207" }, { "category": "external", "summary": "https://curl.se/docs/CVE-2022-32207.html", "url": "https://curl.se/docs/CVE-2022-32207.html" } ], "release_date": "2022-06-27T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-12-08T13:08:14+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nApplications using the APR libraries, such as httpd, must be restarted for this update to take effect. After installing the updated packages, the httpd daemon will be restarted automatically.", "product_ids": [ "7Server-JBCS:jbcs-httpd24-curl-0:7.86.0-2.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-curl-0:7.86.0-2.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.86.0-2.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-0:7.86.0-2.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.86.0-2.el7jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-curl-0:7.86.0-2.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-curl-0:7.86.0-2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-curl-debuginfo-0:7.86.0-2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-0:7.86.0-2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-debuginfo-0:7.86.0-2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-devel-0:7.86.0-2.el8jbcs.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:8840" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-99.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-curl-0:7.86.0-2.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-curl-0:7.86.0-2.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.86.0-2.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.51-37.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.51-37.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.51-37.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.51-37.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.51-37.el7jbcs.noarch", "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.51-37.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.51-37.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-0:7.86.0-2.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.86.0-2.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-20.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-20.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.19-20.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-44.redhat_1.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-44.redhat_1.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-44.redhat_1.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.51-37.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.4.0-18.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.4.0-18.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.4.0-18.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.17-13.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.17-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-debuginfo-0:1.3.17-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.51-37.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.3-22.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.3-22.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.3-22.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.51-37.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.51-37.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.43.0-11.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.43.0-11.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.43.0-11.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.43.0-11.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1k-13.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1k-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-17.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-17.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-17.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1k-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1k-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1k-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1k-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-32.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-32.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-32.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-static-1:1.1.1k-13.el7jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.1-99.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-ldap-debuginfo-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-mysql-debuginfo-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-nss-debuginfo-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-odbc-debuginfo-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-openssl-debuginfo-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-pgsql-debuginfo-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-sqlite-debuginfo-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-curl-0:7.86.0-2.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-curl-0:7.86.0-2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-curl-debuginfo-0:7.86.0-2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.51-37.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-devel-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-manual-0:2.4.51-37.el8jbcs.noarch", "8Base-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-debuginfo-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-0:7.86.0-2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-debuginfo-0:7.86.0-2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-devel-0:7.86.0-2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-20.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-20.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.19-20.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-44.redhat_1.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-44.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-debuginfo-0:1.2.48-44.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-debuginfo-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.4.0-18.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.4.0-18.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.4.0-18.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.17-13.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.17-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-debuginfo-0:1.3.17-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-debuginfo-1:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.3-22.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.3-22.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.3-22.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-debuginfo-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-1:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-debuginfo-1:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-0:1.43.0-11.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-nghttp2-0:1.43.0-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.43.0-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-devel-0:1.43.0-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-1:1.1.1k-13.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-1:1.1.1k-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-17.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-17.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-17.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1k-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1k-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1k-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-libs-debuginfo-1:1.1.1k-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1k-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-32.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-32.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-32.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-static-1:1.1.1k-13.el8jbcs.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "curl: Unpreserved file permissions" }, { "cve": "CVE-2022-32208", "cwe": { "id": "CWE-924", "name": "Improper Enforcement of Message Integrity During Transmission in a Communication Channel" }, "discovery_date": "2022-06-20T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-99.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.51-37.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.51-37.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.51-37.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.51-37.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.51-37.el7jbcs.noarch", "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.51-37.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.51-37.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-20.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-20.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.19-20.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-44.redhat_1.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-44.redhat_1.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-44.redhat_1.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.51-37.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.4.0-18.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.4.0-18.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.4.0-18.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.17-13.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.17-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-debuginfo-0:1.3.17-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.51-37.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.3-22.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.3-22.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.3-22.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.51-37.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.51-37.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.43.0-11.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.43.0-11.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.43.0-11.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.43.0-11.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1k-13.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1k-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-17.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-17.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-17.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1k-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1k-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1k-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1k-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-32.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-32.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-32.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-static-1:1.1.1k-13.el7jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.1-99.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-ldap-debuginfo-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-mysql-debuginfo-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-nss-debuginfo-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-odbc-debuginfo-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-openssl-debuginfo-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-pgsql-debuginfo-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-sqlite-debuginfo-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.51-37.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-devel-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-manual-0:2.4.51-37.el8jbcs.noarch", "8Base-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-debuginfo-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-20.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-20.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.19-20.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-44.redhat_1.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-44.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-debuginfo-0:1.2.48-44.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-debuginfo-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.4.0-18.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.4.0-18.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.4.0-18.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.17-13.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.17-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-debuginfo-0:1.3.17-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-debuginfo-1:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.3-22.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.3-22.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.3-22.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-debuginfo-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-1:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-debuginfo-1:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-0:1.43.0-11.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-nghttp2-0:1.43.0-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.43.0-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-devel-0:1.43.0-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-1:1.1.1k-13.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-1:1.1.1k-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-17.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-17.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-17.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1k-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1k-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1k-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-libs-debuginfo-1:1.1.1k-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1k-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-32.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-32.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-32.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-static-1:1.1.1k-13.el8jbcs.x86_64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2099306" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in curl. This issue occurs because it mishandles message verification failures when curl does FTP transfers secured by krb5. This flaw makes it possible for a Man-in-the-middle attack to go unnoticed and allows data injection into the client.", "title": "Vulnerability description" }, { "category": "summary", "text": "curl: FTP-KRB bad message verification", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-JBCS:jbcs-httpd24-curl-0:7.86.0-2.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-curl-0:7.86.0-2.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.86.0-2.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-0:7.86.0-2.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.86.0-2.el7jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-curl-0:7.86.0-2.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-curl-0:7.86.0-2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-curl-debuginfo-0:7.86.0-2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-0:7.86.0-2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-debuginfo-0:7.86.0-2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-devel-0:7.86.0-2.el8jbcs.x86_64" ], "known_not_affected": [ "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-99.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.51-37.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.51-37.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.51-37.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.51-37.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.51-37.el7jbcs.noarch", "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.51-37.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.51-37.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-20.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-20.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.19-20.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-44.redhat_1.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-44.redhat_1.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-44.redhat_1.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.51-37.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.4.0-18.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.4.0-18.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.4.0-18.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.17-13.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.17-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-debuginfo-0:1.3.17-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.51-37.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.3-22.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.3-22.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.3-22.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.51-37.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.51-37.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.43.0-11.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.43.0-11.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.43.0-11.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.43.0-11.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1k-13.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1k-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-17.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-17.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-17.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1k-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1k-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1k-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1k-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-32.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-32.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-32.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-static-1:1.1.1k-13.el7jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.1-99.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-ldap-debuginfo-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-mysql-debuginfo-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-nss-debuginfo-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-odbc-debuginfo-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-openssl-debuginfo-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-pgsql-debuginfo-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-sqlite-debuginfo-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.51-37.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-devel-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-manual-0:2.4.51-37.el8jbcs.noarch", "8Base-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-debuginfo-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-20.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-20.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.19-20.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-44.redhat_1.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-44.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-debuginfo-0:1.2.48-44.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-debuginfo-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.4.0-18.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.4.0-18.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.4.0-18.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.17-13.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.17-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-debuginfo-0:1.3.17-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-debuginfo-1:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.3-22.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.3-22.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.3-22.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-debuginfo-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-1:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-debuginfo-1:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-0:1.43.0-11.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-nghttp2-0:1.43.0-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.43.0-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-devel-0:1.43.0-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-1:1.1.1k-13.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-1:1.1.1k-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-17.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-17.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-17.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1k-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1k-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1k-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-libs-debuginfo-1:1.1.1k-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1k-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-32.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-32.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-32.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-static-1:1.1.1k-13.el8jbcs.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-32208" }, { "category": "external", "summary": "RHBZ#2099306", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2099306" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-32208", "url": "https://www.cve.org/CVERecord?id=CVE-2022-32208" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-32208", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-32208" }, { "category": "external", "summary": "https://curl.se/docs/CVE-2022-32208.html", "url": "https://curl.se/docs/CVE-2022-32208.html" } ], "release_date": "2022-06-27T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-12-08T13:08:14+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nApplications using the APR libraries, such as httpd, must be restarted for this update to take effect. After installing the updated packages, the httpd daemon will be restarted automatically.", "product_ids": [ "7Server-JBCS:jbcs-httpd24-curl-0:7.86.0-2.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-curl-0:7.86.0-2.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.86.0-2.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-0:7.86.0-2.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.86.0-2.el7jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-curl-0:7.86.0-2.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-curl-0:7.86.0-2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-curl-debuginfo-0:7.86.0-2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-0:7.86.0-2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-debuginfo-0:7.86.0-2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-devel-0:7.86.0-2.el8jbcs.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:8840" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-99.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-curl-0:7.86.0-2.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-curl-0:7.86.0-2.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.86.0-2.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.51-37.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.51-37.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.51-37.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.51-37.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.51-37.el7jbcs.noarch", "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.51-37.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.51-37.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-0:7.86.0-2.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.86.0-2.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-20.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-20.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.19-20.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-44.redhat_1.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-44.redhat_1.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-44.redhat_1.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.51-37.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.4.0-18.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.4.0-18.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.4.0-18.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.17-13.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.17-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-debuginfo-0:1.3.17-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.51-37.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.3-22.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.3-22.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.3-22.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.51-37.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.51-37.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.43.0-11.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.43.0-11.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.43.0-11.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.43.0-11.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1k-13.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1k-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-17.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-17.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-17.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1k-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1k-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1k-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1k-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-32.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-32.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-32.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-static-1:1.1.1k-13.el7jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.1-99.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-ldap-debuginfo-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-mysql-debuginfo-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-nss-debuginfo-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-odbc-debuginfo-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-openssl-debuginfo-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-pgsql-debuginfo-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-sqlite-debuginfo-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-curl-0:7.86.0-2.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-curl-0:7.86.0-2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-curl-debuginfo-0:7.86.0-2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.51-37.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-devel-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-manual-0:2.4.51-37.el8jbcs.noarch", "8Base-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-debuginfo-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-0:7.86.0-2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-debuginfo-0:7.86.0-2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-devel-0:7.86.0-2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-20.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-20.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.19-20.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-44.redhat_1.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-44.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-debuginfo-0:1.2.48-44.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-debuginfo-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.4.0-18.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.4.0-18.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.4.0-18.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.17-13.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.17-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-debuginfo-0:1.3.17-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-debuginfo-1:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.3-22.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.3-22.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.3-22.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-debuginfo-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-1:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-debuginfo-1:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-0:1.43.0-11.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-nghttp2-0:1.43.0-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.43.0-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-devel-0:1.43.0-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-1:1.1.1k-13.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-1:1.1.1k-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-17.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-17.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-17.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1k-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1k-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1k-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-libs-debuginfo-1:1.1.1k-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1k-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-32.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-32.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-32.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-static-1:1.1.1k-13.el8jbcs.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "curl: FTP-KRB bad message verification" }, { "cve": "CVE-2022-32221", "cwe": { "id": "CWE-440", "name": "Expected Behavior Violation" }, "discovery_date": "2022-10-17T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-99.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.51-37.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.51-37.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.51-37.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.51-37.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.51-37.el7jbcs.noarch", "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.51-37.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.51-37.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-20.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-20.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.19-20.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-44.redhat_1.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-44.redhat_1.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-44.redhat_1.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.51-37.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.4.0-18.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.4.0-18.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.4.0-18.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.17-13.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.17-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-debuginfo-0:1.3.17-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.51-37.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.3-22.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.3-22.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.3-22.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.51-37.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.51-37.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.43.0-11.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.43.0-11.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.43.0-11.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.43.0-11.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1k-13.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1k-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-17.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-17.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-17.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1k-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1k-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1k-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1k-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-32.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-32.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-32.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-static-1:1.1.1k-13.el7jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.1-99.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-ldap-debuginfo-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-mysql-debuginfo-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-nss-debuginfo-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-odbc-debuginfo-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-openssl-debuginfo-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-pgsql-debuginfo-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-sqlite-debuginfo-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.51-37.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-devel-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-manual-0:2.4.51-37.el8jbcs.noarch", "8Base-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-debuginfo-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-20.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-20.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.19-20.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-44.redhat_1.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-44.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-debuginfo-0:1.2.48-44.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-debuginfo-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.4.0-18.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.4.0-18.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.4.0-18.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.17-13.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.17-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-debuginfo-0:1.3.17-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-debuginfo-1:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.3-22.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.3-22.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.3-22.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-debuginfo-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-1:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-debuginfo-1:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-0:1.43.0-11.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-nghttp2-0:1.43.0-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.43.0-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-devel-0:1.43.0-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-1:1.1.1k-13.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-1:1.1.1k-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-17.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-17.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-17.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1k-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1k-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1k-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-libs-debuginfo-1:1.1.1k-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1k-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-32.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-32.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-32.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-static-1:1.1.1k-13.el8jbcs.x86_64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2135411" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in curl. The issue occurs when doing HTTP(S) transfers, where curl might erroneously use the read callback (`CURLOPT_READFUNCTION`) to ask for data to send, even when the `CURLOPT_POSTFIELDS` option has been set if it previously used the same handle to issue a `PUT` request which used that callback. This flaw may surprise the application and cause it to misbehave and either send off the wrong data or use memory after free or similar in the subsequent `POST` request.", "title": "Vulnerability description" }, { "category": "summary", "text": "curl: POST following PUT confusion", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-JBCS:jbcs-httpd24-curl-0:7.86.0-2.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-curl-0:7.86.0-2.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.86.0-2.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-0:7.86.0-2.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.86.0-2.el7jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-curl-0:7.86.0-2.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-curl-0:7.86.0-2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-curl-debuginfo-0:7.86.0-2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-0:7.86.0-2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-debuginfo-0:7.86.0-2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-devel-0:7.86.0-2.el8jbcs.x86_64" ], "known_not_affected": [ "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-99.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.51-37.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.51-37.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.51-37.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.51-37.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.51-37.el7jbcs.noarch", "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.51-37.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.51-37.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-20.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-20.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.19-20.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-44.redhat_1.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-44.redhat_1.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-44.redhat_1.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.51-37.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.4.0-18.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.4.0-18.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.4.0-18.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.17-13.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.17-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-debuginfo-0:1.3.17-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.51-37.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.3-22.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.3-22.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.3-22.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.51-37.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.51-37.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.43.0-11.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.43.0-11.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.43.0-11.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.43.0-11.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1k-13.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1k-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-17.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-17.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-17.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1k-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1k-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1k-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1k-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-32.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-32.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-32.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-static-1:1.1.1k-13.el7jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.1-99.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-ldap-debuginfo-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-mysql-debuginfo-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-nss-debuginfo-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-odbc-debuginfo-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-openssl-debuginfo-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-pgsql-debuginfo-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-sqlite-debuginfo-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.51-37.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-devel-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-manual-0:2.4.51-37.el8jbcs.noarch", "8Base-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-debuginfo-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-20.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-20.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.19-20.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-44.redhat_1.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-44.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-debuginfo-0:1.2.48-44.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-debuginfo-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.4.0-18.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.4.0-18.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.4.0-18.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.17-13.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.17-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-debuginfo-0:1.3.17-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-debuginfo-1:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.3-22.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.3-22.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.3-22.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-debuginfo-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-1:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-debuginfo-1:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-0:1.43.0-11.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-nghttp2-0:1.43.0-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.43.0-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-devel-0:1.43.0-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-1:1.1.1k-13.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-1:1.1.1k-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-17.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-17.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-17.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1k-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1k-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1k-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-libs-debuginfo-1:1.1.1k-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1k-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-32.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-32.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-32.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-static-1:1.1.1k-13.el8jbcs.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-32221" }, { "category": "external", "summary": "RHBZ#2135411", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2135411" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-32221", "url": "https://www.cve.org/CVERecord?id=CVE-2022-32221" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-32221", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-32221" }, { "category": "external", "summary": "https://curl.se/docs/CVE-2022-32221.html", "url": "https://curl.se/docs/CVE-2022-32221.html" } ], "release_date": "2022-10-26T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-12-08T13:08:14+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nApplications using the APR libraries, such as httpd, must be restarted for this update to take effect. After installing the updated packages, the httpd daemon will be restarted automatically.", "product_ids": [ "7Server-JBCS:jbcs-httpd24-curl-0:7.86.0-2.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-curl-0:7.86.0-2.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.86.0-2.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-0:7.86.0-2.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.86.0-2.el7jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-curl-0:7.86.0-2.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-curl-0:7.86.0-2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-curl-debuginfo-0:7.86.0-2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-0:7.86.0-2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-debuginfo-0:7.86.0-2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-devel-0:7.86.0-2.el8jbcs.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:8840" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N", "version": "3.1" }, "products": [ "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-99.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-curl-0:7.86.0-2.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-curl-0:7.86.0-2.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.86.0-2.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.51-37.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.51-37.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.51-37.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.51-37.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.51-37.el7jbcs.noarch", "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.51-37.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.51-37.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-0:7.86.0-2.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.86.0-2.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-20.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-20.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.19-20.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-44.redhat_1.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-44.redhat_1.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-44.redhat_1.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.51-37.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.4.0-18.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.4.0-18.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.4.0-18.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.17-13.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.17-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-debuginfo-0:1.3.17-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.51-37.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.3-22.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.3-22.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.3-22.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.51-37.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.51-37.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.43.0-11.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.43.0-11.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.43.0-11.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.43.0-11.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1k-13.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1k-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-17.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-17.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-17.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1k-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1k-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1k-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1k-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-32.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-32.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-32.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-static-1:1.1.1k-13.el7jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.1-99.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-ldap-debuginfo-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-mysql-debuginfo-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-nss-debuginfo-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-odbc-debuginfo-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-openssl-debuginfo-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-pgsql-debuginfo-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-sqlite-debuginfo-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-curl-0:7.86.0-2.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-curl-0:7.86.0-2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-curl-debuginfo-0:7.86.0-2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.51-37.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-devel-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-manual-0:2.4.51-37.el8jbcs.noarch", "8Base-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-debuginfo-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-0:7.86.0-2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-debuginfo-0:7.86.0-2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-devel-0:7.86.0-2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-20.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-20.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.19-20.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-44.redhat_1.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-44.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-debuginfo-0:1.2.48-44.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-debuginfo-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.4.0-18.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.4.0-18.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.4.0-18.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.17-13.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.17-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-debuginfo-0:1.3.17-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-debuginfo-1:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.3-22.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.3-22.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.3-22.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-debuginfo-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-1:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-debuginfo-1:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-0:1.43.0-11.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-nghttp2-0:1.43.0-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.43.0-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-devel-0:1.43.0-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-1:1.1.1k-13.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-1:1.1.1k-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-17.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-17.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-17.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1k-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1k-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1k-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-libs-debuginfo-1:1.1.1k-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1k-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-32.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-32.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-32.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-static-1:1.1.1k-13.el8jbcs.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "curl: POST following PUT confusion" }, { "cve": "CVE-2022-35252", "cwe": { "id": "CWE-1286", "name": "Improper Validation of Syntactic Correctness of Input" }, "discovery_date": "2022-08-23T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-99.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.51-37.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.51-37.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.51-37.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.51-37.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.51-37.el7jbcs.noarch", "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.51-37.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.51-37.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-20.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-20.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.19-20.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-44.redhat_1.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-44.redhat_1.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-44.redhat_1.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.51-37.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.4.0-18.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.4.0-18.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.4.0-18.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.17-13.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.17-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-debuginfo-0:1.3.17-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.51-37.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.3-22.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.3-22.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.3-22.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.51-37.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.51-37.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.43.0-11.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.43.0-11.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.43.0-11.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.43.0-11.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1k-13.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1k-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-17.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-17.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-17.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1k-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1k-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1k-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1k-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-32.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-32.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-32.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-static-1:1.1.1k-13.el7jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.1-99.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-ldap-debuginfo-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-mysql-debuginfo-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-nss-debuginfo-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-odbc-debuginfo-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-openssl-debuginfo-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-pgsql-debuginfo-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-sqlite-debuginfo-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.51-37.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-devel-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-manual-0:2.4.51-37.el8jbcs.noarch", "8Base-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-debuginfo-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-20.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-20.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.19-20.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-44.redhat_1.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-44.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-debuginfo-0:1.2.48-44.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-debuginfo-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.4.0-18.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.4.0-18.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.4.0-18.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.17-13.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.17-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-debuginfo-0:1.3.17-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-debuginfo-1:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.3-22.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.3-22.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.3-22.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-debuginfo-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-1:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-debuginfo-1:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-0:1.43.0-11.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-nghttp2-0:1.43.0-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.43.0-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-devel-0:1.43.0-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-1:1.1.1k-13.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-1:1.1.1k-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-17.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-17.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-17.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1k-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1k-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1k-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-libs-debuginfo-1:1.1.1k-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1k-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-32.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-32.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-32.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-static-1:1.1.1k-13.el8jbcs.x86_64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2120718" } ], "notes": [ { "category": "description", "text": "A vulnerability found in curl. This security flaw happens when curl is used to retrieve and parse cookies from an HTTP(S) server, where it accepts cookies using control codes (byte values below 32), and also when cookies that contain such control codes are later sent back to an HTTP(S) server, possibly causing the server to return a 400 response. This issue effectively allows a \"sister site\" to deny service to siblings and cause a denial of service attack.", "title": "Vulnerability description" }, { "category": "summary", "text": "curl: Incorrect handling of control code characters in cookies", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-JBCS:jbcs-httpd24-curl-0:7.86.0-2.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-curl-0:7.86.0-2.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.86.0-2.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-0:7.86.0-2.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.86.0-2.el7jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-curl-0:7.86.0-2.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-curl-0:7.86.0-2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-curl-debuginfo-0:7.86.0-2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-0:7.86.0-2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-debuginfo-0:7.86.0-2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-devel-0:7.86.0-2.el8jbcs.x86_64" ], "known_not_affected": [ "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-99.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.51-37.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.51-37.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.51-37.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.51-37.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.51-37.el7jbcs.noarch", "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.51-37.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.51-37.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-20.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-20.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.19-20.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-44.redhat_1.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-44.redhat_1.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-44.redhat_1.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.51-37.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.4.0-18.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.4.0-18.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.4.0-18.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.17-13.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.17-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-debuginfo-0:1.3.17-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.51-37.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.3-22.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.3-22.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.3-22.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.51-37.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.51-37.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.43.0-11.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.43.0-11.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.43.0-11.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.43.0-11.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1k-13.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1k-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-17.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-17.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-17.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1k-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1k-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1k-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1k-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-32.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-32.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-32.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-static-1:1.1.1k-13.el7jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.1-99.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-ldap-debuginfo-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-mysql-debuginfo-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-nss-debuginfo-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-odbc-debuginfo-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-openssl-debuginfo-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-pgsql-debuginfo-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-sqlite-debuginfo-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.51-37.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-devel-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-manual-0:2.4.51-37.el8jbcs.noarch", "8Base-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-debuginfo-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-20.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-20.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.19-20.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-44.redhat_1.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-44.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-debuginfo-0:1.2.48-44.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-debuginfo-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.4.0-18.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.4.0-18.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.4.0-18.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.17-13.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.17-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-debuginfo-0:1.3.17-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-debuginfo-1:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.3-22.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.3-22.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.3-22.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-debuginfo-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-1:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-debuginfo-1:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-0:1.43.0-11.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-nghttp2-0:1.43.0-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.43.0-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-devel-0:1.43.0-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-1:1.1.1k-13.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-1:1.1.1k-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-17.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-17.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-17.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1k-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1k-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1k-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-libs-debuginfo-1:1.1.1k-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1k-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-32.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-32.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-32.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-static-1:1.1.1k-13.el8jbcs.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-35252" }, { "category": "external", "summary": "RHBZ#2120718", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2120718" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-35252", "url": "https://www.cve.org/CVERecord?id=CVE-2022-35252" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-35252", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-35252" } ], "release_date": "2022-08-31T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-12-08T13:08:14+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nApplications using the APR libraries, such as httpd, must be restarted for this update to take effect. After installing the updated packages, the httpd daemon will be restarted automatically.", "product_ids": [ "7Server-JBCS:jbcs-httpd24-curl-0:7.86.0-2.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-curl-0:7.86.0-2.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.86.0-2.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-0:7.86.0-2.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.86.0-2.el7jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-curl-0:7.86.0-2.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-curl-0:7.86.0-2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-curl-debuginfo-0:7.86.0-2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-0:7.86.0-2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-debuginfo-0:7.86.0-2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-devel-0:7.86.0-2.el8jbcs.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:8840" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 3.1, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-99.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-curl-0:7.86.0-2.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-curl-0:7.86.0-2.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.86.0-2.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.51-37.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.51-37.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.51-37.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.51-37.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.51-37.el7jbcs.noarch", "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.51-37.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.51-37.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-0:7.86.0-2.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.86.0-2.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-20.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-20.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.19-20.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-44.redhat_1.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-44.redhat_1.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-44.redhat_1.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.51-37.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.4.0-18.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.4.0-18.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.4.0-18.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.17-13.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.17-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-debuginfo-0:1.3.17-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.51-37.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.3-22.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.3-22.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.3-22.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.51-37.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.51-37.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.43.0-11.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.43.0-11.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.43.0-11.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.43.0-11.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1k-13.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1k-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-17.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-17.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-17.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1k-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1k-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1k-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1k-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-32.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-32.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-32.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-static-1:1.1.1k-13.el7jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.1-99.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-ldap-debuginfo-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-mysql-debuginfo-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-nss-debuginfo-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-odbc-debuginfo-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-openssl-debuginfo-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-pgsql-debuginfo-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-sqlite-debuginfo-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-curl-0:7.86.0-2.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-curl-0:7.86.0-2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-curl-debuginfo-0:7.86.0-2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.51-37.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-devel-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-manual-0:2.4.51-37.el8jbcs.noarch", "8Base-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-debuginfo-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-0:7.86.0-2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-debuginfo-0:7.86.0-2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-devel-0:7.86.0-2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-20.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-20.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.19-20.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-44.redhat_1.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-44.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-debuginfo-0:1.2.48-44.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-debuginfo-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.4.0-18.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.4.0-18.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.4.0-18.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.17-13.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.17-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-debuginfo-0:1.3.17-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-debuginfo-1:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.3-22.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.3-22.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.3-22.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-debuginfo-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-1:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-debuginfo-1:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-0:1.43.0-11.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-nghttp2-0:1.43.0-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.43.0-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-devel-0:1.43.0-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-1:1.1.1k-13.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-1:1.1.1k-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-17.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-17.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-17.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1k-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1k-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1k-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-libs-debuginfo-1:1.1.1k-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1k-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-32.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-32.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-32.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-static-1:1.1.1k-13.el8jbcs.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "curl: Incorrect handling of control code characters in cookies" }, { "cve": "CVE-2022-42915", "cwe": { "id": "CWE-415", "name": "Double Free" }, "discovery_date": "2022-10-17T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-99.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.51-37.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.51-37.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.51-37.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.51-37.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.51-37.el7jbcs.noarch", "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.51-37.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.51-37.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-20.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-20.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.19-20.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-44.redhat_1.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-44.redhat_1.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-44.redhat_1.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.51-37.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.4.0-18.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.4.0-18.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.4.0-18.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.17-13.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.17-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-debuginfo-0:1.3.17-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.51-37.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.3-22.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.3-22.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.3-22.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.51-37.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.51-37.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.43.0-11.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.43.0-11.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.43.0-11.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.43.0-11.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1k-13.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1k-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-17.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-17.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-17.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1k-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1k-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1k-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1k-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-32.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-32.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-32.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-static-1:1.1.1k-13.el7jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.1-99.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-ldap-debuginfo-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-mysql-debuginfo-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-nss-debuginfo-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-odbc-debuginfo-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-openssl-debuginfo-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-pgsql-debuginfo-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-sqlite-debuginfo-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.51-37.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-devel-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-manual-0:2.4.51-37.el8jbcs.noarch", "8Base-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-debuginfo-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-20.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-20.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.19-20.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-44.redhat_1.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-44.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-debuginfo-0:1.2.48-44.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-debuginfo-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.4.0-18.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.4.0-18.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.4.0-18.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.17-13.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.17-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-debuginfo-0:1.3.17-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-debuginfo-1:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.3-22.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.3-22.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.3-22.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-debuginfo-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-1:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-debuginfo-1:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-0:1.43.0-11.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-nghttp2-0:1.43.0-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.43.0-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-devel-0:1.43.0-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-1:1.1.1k-13.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-1:1.1.1k-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-17.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-17.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-17.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1k-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1k-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1k-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-libs-debuginfo-1:1.1.1k-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1k-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-32.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-32.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-32.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-static-1:1.1.1k-13.el8jbcs.x86_64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2135413" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in curl. The issue occurs if curl is told to use an HTTP proxy for a transfer with a non-HTTP(S) URL. It sets up the connection to the remote server by issuing a `CONNECT` request to the proxy and then tunnels the rest of the protocol through. An HTTP proxy might refuse this request (HTTP proxies often only allow outgoing connections to specific port numbers, like 443 for HTTPS) and instead return a non-200 response code to the client. Due to flaws in the error/cleanup handling, this could trigger a double-free issue in curl if using one of the following schemes in the URL for the transfer: `dict,` `gopher,` `gophers,` `ldap`, `ldaps`, `rtmp`, `rtmps`, `telnet.`", "title": "Vulnerability description" }, { "category": "summary", "text": "curl: HTTP proxy double-free", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-JBCS:jbcs-httpd24-curl-0:7.86.0-2.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-curl-0:7.86.0-2.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.86.0-2.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-0:7.86.0-2.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.86.0-2.el7jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-curl-0:7.86.0-2.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-curl-0:7.86.0-2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-curl-debuginfo-0:7.86.0-2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-0:7.86.0-2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-debuginfo-0:7.86.0-2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-devel-0:7.86.0-2.el8jbcs.x86_64" ], "known_not_affected": [ "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-99.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.51-37.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.51-37.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.51-37.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.51-37.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.51-37.el7jbcs.noarch", "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.51-37.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.51-37.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-20.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-20.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.19-20.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-44.redhat_1.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-44.redhat_1.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-44.redhat_1.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.51-37.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.4.0-18.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.4.0-18.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.4.0-18.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.17-13.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.17-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-debuginfo-0:1.3.17-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.51-37.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.3-22.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.3-22.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.3-22.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.51-37.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.51-37.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.43.0-11.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.43.0-11.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.43.0-11.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.43.0-11.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1k-13.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1k-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-17.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-17.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-17.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1k-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1k-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1k-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1k-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-32.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-32.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-32.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-static-1:1.1.1k-13.el7jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.1-99.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-ldap-debuginfo-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-mysql-debuginfo-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-nss-debuginfo-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-odbc-debuginfo-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-openssl-debuginfo-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-pgsql-debuginfo-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-sqlite-debuginfo-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.51-37.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-devel-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-manual-0:2.4.51-37.el8jbcs.noarch", "8Base-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-debuginfo-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-20.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-20.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.19-20.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-44.redhat_1.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-44.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-debuginfo-0:1.2.48-44.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-debuginfo-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.4.0-18.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.4.0-18.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.4.0-18.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.17-13.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.17-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-debuginfo-0:1.3.17-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-debuginfo-1:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.3-22.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.3-22.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.3-22.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-debuginfo-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-1:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-debuginfo-1:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-0:1.43.0-11.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-nghttp2-0:1.43.0-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.43.0-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-devel-0:1.43.0-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-1:1.1.1k-13.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-1:1.1.1k-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-17.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-17.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-17.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1k-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1k-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1k-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-libs-debuginfo-1:1.1.1k-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1k-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-32.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-32.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-32.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-static-1:1.1.1k-13.el8jbcs.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-42915" }, { "category": "external", "summary": "RHBZ#2135413", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2135413" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-42915", "url": "https://www.cve.org/CVERecord?id=CVE-2022-42915" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-42915", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-42915" }, { "category": "external", "summary": "https://curl.se/docs/CVE-2022-42915.html", "url": "https://curl.se/docs/CVE-2022-42915.html" } ], "release_date": "2022-10-26T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-12-08T13:08:14+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nApplications using the APR libraries, such as httpd, must be restarted for this update to take effect. After installing the updated packages, the httpd daemon will be restarted automatically.", "product_ids": [ "7Server-JBCS:jbcs-httpd24-curl-0:7.86.0-2.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-curl-0:7.86.0-2.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.86.0-2.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-0:7.86.0-2.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.86.0-2.el7jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-curl-0:7.86.0-2.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-curl-0:7.86.0-2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-curl-debuginfo-0:7.86.0-2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-0:7.86.0-2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-debuginfo-0:7.86.0-2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-devel-0:7.86.0-2.el8jbcs.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:8840" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-99.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-curl-0:7.86.0-2.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-curl-0:7.86.0-2.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.86.0-2.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.51-37.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.51-37.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.51-37.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.51-37.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.51-37.el7jbcs.noarch", "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.51-37.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.51-37.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-0:7.86.0-2.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.86.0-2.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-20.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-20.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.19-20.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-44.redhat_1.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-44.redhat_1.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-44.redhat_1.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.51-37.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.4.0-18.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.4.0-18.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.4.0-18.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.17-13.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.17-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-debuginfo-0:1.3.17-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.51-37.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.3-22.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.3-22.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.3-22.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.51-37.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.51-37.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.43.0-11.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.43.0-11.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.43.0-11.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.43.0-11.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1k-13.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1k-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-17.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-17.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-17.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1k-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1k-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1k-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1k-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-32.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-32.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-32.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-static-1:1.1.1k-13.el7jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.1-99.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-ldap-debuginfo-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-mysql-debuginfo-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-nss-debuginfo-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-odbc-debuginfo-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-openssl-debuginfo-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-pgsql-debuginfo-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-sqlite-debuginfo-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-curl-0:7.86.0-2.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-curl-0:7.86.0-2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-curl-debuginfo-0:7.86.0-2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.51-37.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-devel-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-manual-0:2.4.51-37.el8jbcs.noarch", "8Base-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-debuginfo-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-0:7.86.0-2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-debuginfo-0:7.86.0-2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-devel-0:7.86.0-2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-20.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-20.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.19-20.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-44.redhat_1.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-44.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-debuginfo-0:1.2.48-44.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-debuginfo-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.4.0-18.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.4.0-18.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.4.0-18.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.17-13.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.17-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-debuginfo-0:1.3.17-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-debuginfo-1:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.3-22.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.3-22.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.3-22.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-debuginfo-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-1:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-debuginfo-1:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-0:1.43.0-11.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-nghttp2-0:1.43.0-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.43.0-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-devel-0:1.43.0-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-1:1.1.1k-13.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-1:1.1.1k-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-17.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-17.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-17.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1k-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1k-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1k-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-libs-debuginfo-1:1.1.1k-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1k-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-32.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-32.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-32.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-static-1:1.1.1k-13.el8jbcs.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "curl: HTTP proxy double-free" }, { "cve": "CVE-2022-42916", "cwe": { "id": "CWE-319", "name": "Cleartext Transmission of Sensitive Information" }, "discovery_date": "2022-10-17T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-99.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.51-37.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.51-37.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.51-37.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.51-37.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.51-37.el7jbcs.noarch", "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.51-37.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.51-37.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-20.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-20.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.19-20.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-44.redhat_1.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-44.redhat_1.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-44.redhat_1.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.51-37.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.4.0-18.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.4.0-18.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.4.0-18.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.17-13.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.17-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-debuginfo-0:1.3.17-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.51-37.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.3-22.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.3-22.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.3-22.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.51-37.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.51-37.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.43.0-11.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.43.0-11.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.43.0-11.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.43.0-11.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1k-13.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1k-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-17.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-17.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-17.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1k-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1k-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1k-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1k-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-32.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-32.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-32.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-static-1:1.1.1k-13.el7jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.1-99.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-ldap-debuginfo-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-mysql-debuginfo-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-nss-debuginfo-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-odbc-debuginfo-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-openssl-debuginfo-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-pgsql-debuginfo-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-sqlite-debuginfo-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.51-37.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-devel-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-manual-0:2.4.51-37.el8jbcs.noarch", "8Base-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-debuginfo-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-20.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-20.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.19-20.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-44.redhat_1.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-44.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-debuginfo-0:1.2.48-44.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-debuginfo-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.4.0-18.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.4.0-18.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.4.0-18.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.17-13.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.17-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-debuginfo-0:1.3.17-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-debuginfo-1:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.3-22.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.3-22.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.3-22.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-debuginfo-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-1:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-debuginfo-1:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-0:1.43.0-11.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-nghttp2-0:1.43.0-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.43.0-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-devel-0:1.43.0-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-1:1.1.1k-13.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-1:1.1.1k-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-17.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-17.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-17.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1k-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1k-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1k-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-libs-debuginfo-1:1.1.1k-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1k-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-32.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-32.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-32.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-static-1:1.1.1k-13.el8jbcs.x86_64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2135416" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in curl. The issue occurs because curl\u0027s HSTS check can be bypassed to trick it to keep using HTTP. Using its HSTS support, it can instruct curl to use HTTPS directly instead of using an insecure clear-text HTTP step even when HTTP is provided in the URL. This mechanism can be bypassed if the hostname in the given URL uses IDN characters that get replaced with ASCII counterparts as part of the IDN conversion. Like using the character UTF-8 U+3002 (IDEOGRAPHIC FULL STOP) instead of the common ASCII full stop (U+002E) `.`.", "title": "Vulnerability description" }, { "category": "summary", "text": "curl: HSTS bypass via IDN", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-JBCS:jbcs-httpd24-curl-0:7.86.0-2.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-curl-0:7.86.0-2.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.86.0-2.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-0:7.86.0-2.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.86.0-2.el7jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-curl-0:7.86.0-2.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-curl-0:7.86.0-2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-curl-debuginfo-0:7.86.0-2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-0:7.86.0-2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-debuginfo-0:7.86.0-2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-devel-0:7.86.0-2.el8jbcs.x86_64" ], "known_not_affected": [ "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-99.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.51-37.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.51-37.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.51-37.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.51-37.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.51-37.el7jbcs.noarch", "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.51-37.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.51-37.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-20.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-20.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.19-20.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-44.redhat_1.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-44.redhat_1.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-44.redhat_1.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.51-37.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.4.0-18.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.4.0-18.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.4.0-18.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.17-13.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.17-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-debuginfo-0:1.3.17-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.51-37.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.3-22.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.3-22.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.3-22.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.51-37.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.51-37.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.43.0-11.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.43.0-11.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.43.0-11.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.43.0-11.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1k-13.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1k-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-17.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-17.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-17.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1k-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1k-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1k-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1k-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-32.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-32.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-32.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-static-1:1.1.1k-13.el7jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.1-99.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-ldap-debuginfo-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-mysql-debuginfo-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-nss-debuginfo-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-odbc-debuginfo-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-openssl-debuginfo-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-pgsql-debuginfo-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-sqlite-debuginfo-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.51-37.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-devel-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-manual-0:2.4.51-37.el8jbcs.noarch", "8Base-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-debuginfo-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-20.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-20.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.19-20.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-44.redhat_1.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-44.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-debuginfo-0:1.2.48-44.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-debuginfo-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.4.0-18.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.4.0-18.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.4.0-18.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.17-13.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.17-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-debuginfo-0:1.3.17-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-debuginfo-1:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.3-22.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.3-22.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.3-22.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-debuginfo-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-1:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-debuginfo-1:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-0:1.43.0-11.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-nghttp2-0:1.43.0-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.43.0-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-devel-0:1.43.0-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-1:1.1.1k-13.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-1:1.1.1k-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-17.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-17.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-17.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1k-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1k-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1k-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-libs-debuginfo-1:1.1.1k-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1k-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-32.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-32.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-32.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-static-1:1.1.1k-13.el8jbcs.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-42916" }, { "category": "external", "summary": "RHBZ#2135416", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2135416" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-42916", "url": "https://www.cve.org/CVERecord?id=CVE-2022-42916" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-42916", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-42916" }, { "category": "external", "summary": "https://curl.se/docs/CVE-2022-42916.html", "url": "https://curl.se/docs/CVE-2022-42916.html" } ], "release_date": "2022-10-26T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-12-08T13:08:14+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nApplications using the APR libraries, such as httpd, must be restarted for this update to take effect. After installing the updated packages, the httpd daemon will be restarted automatically.", "product_ids": [ "7Server-JBCS:jbcs-httpd24-curl-0:7.86.0-2.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-curl-0:7.86.0-2.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.86.0-2.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-0:7.86.0-2.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.86.0-2.el7jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-curl-0:7.86.0-2.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-curl-0:7.86.0-2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-curl-debuginfo-0:7.86.0-2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-0:7.86.0-2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-debuginfo-0:7.86.0-2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-devel-0:7.86.0-2.el8jbcs.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:8840" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-99.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-99.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-curl-0:7.86.0-2.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-curl-0:7.86.0-2.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.86.0-2.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.51-37.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.51-37.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.51-37.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.51-37.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.51-37.el7jbcs.noarch", "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.51-37.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.51-37.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-0:7.86.0-2.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.86.0-2.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-20.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-20.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.19-20.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-44.redhat_1.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-44.redhat_1.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-44.redhat_1.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.51-37.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.4.0-18.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.4.0-18.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.4.0-18.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.17-13.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.17-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_cluster-debuginfo-0:1.3.17-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.51-37.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.3-22.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.3-22.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.3-22.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.51-37.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.51-37.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.43.0-11.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.43.0-11.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.43.0-11.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.43.0-11.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1k-13.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1k-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-17.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-17.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-17.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1k-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1k-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1k-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1k-13.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-32.el7jbcs.src", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-32.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-32.el7jbcs.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-static-1:1.1.1k-13.el7jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.1-99.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-ldap-debuginfo-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-mysql-debuginfo-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-nss-debuginfo-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-odbc-debuginfo-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-openssl-debuginfo-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-pgsql-debuginfo-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-sqlite-debuginfo-0:1.6.1-99.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-curl-0:7.86.0-2.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-curl-0:7.86.0-2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-curl-debuginfo-0:7.86.0-2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.51-37.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-devel-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-manual-0:2.4.51-37.el8jbcs.noarch", "8Base-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-debuginfo-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-0:7.86.0-2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-debuginfo-0:7.86.0-2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-devel-0:7.86.0-2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-20.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.19-20.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.19-20.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-44.redhat_1.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-44.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-debuginfo-0:1.2.48-44.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-debuginfo-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.4.0-18.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.4.0-18.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.4.0-18.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.17-13.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-0:1.3.17-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_cluster-debuginfo-0:1.3.17-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-debuginfo-1:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.3-22.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.3-22.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.3-22.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-debuginfo-0:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-1:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-debuginfo-1:2.4.51-37.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-0:1.43.0-11.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-nghttp2-0:1.43.0-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.43.0-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-devel-0:1.43.0-11.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-1:1.1.1k-13.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-1:1.1.1k-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-17.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-17.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-17.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1k-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1k-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1k-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-libs-debuginfo-1:1.1.1k-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1k-13.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-32.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-32.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-32.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-static-1:1.1.1k-13.el8jbcs.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "curl: HSTS bypass via IDN" } ] }
rhsa-2022_6753
Vulnerability from csaf_redhat
Published
2022-09-29 13:33
Modified
2024-11-15 14:57
Summary
Red Hat Security Advisory: httpd24-httpd security and bug fix update
Notes
Topic
An update for httpd24-httpd is now available for Red Hat Software Collections.
Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
The httpd packages provide the Apache HTTP Server, a powerful, efficient, and extensible web server.
Security Fix(es):
* httpd: mod_sed: Read/write beyond bounds (CVE-2022-23943)
* httpd: Request splitting via HTTP/2 method injection and mod_proxy (CVE-2021-33193)
* httpd: NULL pointer dereference via malformed requests (CVE-2021-34798)
* httpd: mod_proxy_uwsgi: out-of-bounds read via a crafted request uri-path (CVE-2021-36160)
* httpd: Out-of-bounds write in ap_escape_quotes() via malicious input (CVE-2021-39275)
* httpd: possible NULL dereference or SSRF in forward proxy configurations (CVE-2021-44224)
* httpd: mod_lua: Use of uninitialized value of in r:parsebody (CVE-2022-22719)
* httpd: core: Possible buffer overflow with very large or unlimited LimitXMLRequestBody (CVE-2022-22721)
* httpd: mod_proxy_ajp: Possible request smuggling (CVE-2022-26377)
* httpd: mod_lua: DoS in r:parsebody (CVE-2022-29404)
* httpd: mod_sed: DoS vulnerability (CVE-2022-30522)
* httpd: mod_proxy: X-Forwarded-For dropped by hop-by-hop mechanism (CVE-2022-31813)
* httpd: out-of-bounds read via ap_rwrite() (CVE-2022-28614)
* httpd: out-of-bounds read in ap_strcmp_match() (CVE-2022-28615)
* httpd: mod_lua: Information disclosure with websockets (CVE-2022-30556)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Bug Fix(es):
* proxy rewrite to unix socket fails with CVE-2021-40438 fix (BZ#2022319)
Additional changes:
* To fix CVE-2022-29404, the default value for the "LimitRequestBody" directive in the Apache HTTP Server has been changed from 0 (unlimited) to 1 GiB.
On systems where the value of "LimitRequestBody" is not explicitly specified in an httpd configuration file, updating the httpd package sets "LimitRequestBody" to the default value of 1 GiB. As a consequence, if the total size of the HTTP request body exceeds this 1 GiB default limit, httpd returns the 413 Request Entity Too Large error code.
If the new default allowed size of an HTTP request message body is insufficient for your use case, update your httpd configuration files within the respective context (server, per-directory, per-file, or per-location) and set your preferred limit in bytes. For example, to set a new 2 GiB limit, use:
LimitRequestBody 2147483648
Systems already configured to use any explicit value for the "LimitRequestBody" directive are unaffected by this change.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for httpd24-httpd is now available for Red Hat Software Collections.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "The httpd packages provide the Apache HTTP Server, a powerful, efficient, and extensible web server.\n\nSecurity Fix(es):\n\n* httpd: mod_sed: Read/write beyond bounds (CVE-2022-23943)\n\n* httpd: Request splitting via HTTP/2 method injection and mod_proxy (CVE-2021-33193)\n\n* httpd: NULL pointer dereference via malformed requests (CVE-2021-34798)\n\n* httpd: mod_proxy_uwsgi: out-of-bounds read via a crafted request uri-path (CVE-2021-36160)\n\n* httpd: Out-of-bounds write in ap_escape_quotes() via malicious input (CVE-2021-39275)\n\n* httpd: possible NULL dereference or SSRF in forward proxy configurations (CVE-2021-44224)\n\n* httpd: mod_lua: Use of uninitialized value of in r:parsebody (CVE-2022-22719)\n\n* httpd: core: Possible buffer overflow with very large or unlimited LimitXMLRequestBody (CVE-2022-22721)\n\n* httpd: mod_proxy_ajp: Possible request smuggling (CVE-2022-26377)\n\n* httpd: mod_lua: DoS in r:parsebody (CVE-2022-29404)\n\n* httpd: mod_sed: DoS vulnerability (CVE-2022-30522)\n\n* httpd: mod_proxy: X-Forwarded-For dropped by hop-by-hop mechanism (CVE-2022-31813)\n\n* httpd: out-of-bounds read via ap_rwrite() (CVE-2022-28614)\n\n* httpd: out-of-bounds read in ap_strcmp_match() (CVE-2022-28615)\n\n* httpd: mod_lua: Information disclosure with websockets (CVE-2022-30556)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nBug Fix(es):\n\n* proxy rewrite to unix socket fails with CVE-2021-40438 fix (BZ#2022319)\n\nAdditional changes:\n\n* To fix CVE-2022-29404, the default value for the \"LimitRequestBody\" directive in the Apache HTTP Server has been changed from 0 (unlimited) to 1 GiB. \n\nOn systems where the value of \"LimitRequestBody\" is not explicitly specified in an httpd configuration file, updating the httpd package sets \"LimitRequestBody\" to the default value of 1 GiB. As a consequence, if the total size of the HTTP request body exceeds this 1 GiB default limit, httpd returns the 413 Request Entity Too Large error code.\n\nIf the new default allowed size of an HTTP request message body is insufficient for your use case, update your httpd configuration files within the respective context (server, per-directory, per-file, or per-location) and set your preferred limit in bytes. For example, to set a new 2 GiB limit, use:\n\nLimitRequestBody 2147483648\n\nSystems already configured to use any explicit value for the \"LimitRequestBody\" directive are unaffected by this change.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2022:6753", "url": "https://access.redhat.com/errata/RHSA-2022:6753" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "https://access.redhat.com/articles/6975397", "url": "https://access.redhat.com/articles/6975397" }, { "category": "external", "summary": "1966728", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1966728" }, { "category": "external", "summary": "2005119", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2005119" }, { "category": "external", "summary": "2005124", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2005124" }, { "category": "external", "summary": "2005128", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2005128" }, { "category": "external", "summary": "2034672", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2034672" }, { "category": "external", "summary": "2064319", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2064319" }, { "category": "external", "summary": "2064320", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2064320" }, { "category": "external", "summary": "2064322", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2064322" }, { "category": "external", "summary": "2094997", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2094997" }, { "category": "external", "summary": "2095002", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2095002" }, { "category": "external", "summary": "2095006", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2095006" }, { "category": "external", "summary": "2095012", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2095012" }, { "category": "external", "summary": "2095015", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2095015" }, { "category": "external", "summary": "2095018", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2095018" }, { "category": "external", "summary": "2095020", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2095020" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2022/rhsa-2022_6753.json" } ], "title": "Red Hat Security Advisory: httpd24-httpd security and bug fix update", "tracking": { "current_release_date": "2024-11-15T14:57:02+00:00", "generator": { "date": "2024-11-15T14:57:02+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2022:6753", "initial_release_date": "2022-09-29T13:33:06+00:00", "revision_history": [ { "date": "2022-09-29T13:33:06+00:00", "number": "1", "summary": "Initial version" }, { "date": "2022-09-29T13:33:06+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-15T14:57:02+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Software Collections for RHEL Workstation(v. 7)", "product": { "name": "Red Hat Software Collections for RHEL Workstation(v. 7)", "product_id": "7Server-RHSCL-3.8", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_software_collections:3::el7" } } }, { "category": "product_name", "name": "Red Hat Software Collections for RHEL(v. 7)", "product": { "name": "Red Hat Software Collections for RHEL(v. 7)", "product_id": "7Workstation-RHSCL-3.8", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_software_collections:3::el7" } } } ], "category": "product_family", "name": "Red Hat Software Collections" }, { "branches": [ { "category": "product_version", "name": "httpd24-httpd-0:2.4.34-23.el7.5.src", "product": { "name": "httpd24-httpd-0:2.4.34-23.el7.5.src", "product_id": "httpd24-httpd-0:2.4.34-23.el7.5.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd24-httpd@2.4.34-23.el7.5?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "httpd24-httpd-0:2.4.34-23.el7.5.x86_64", "product": { "name": "httpd24-httpd-0:2.4.34-23.el7.5.x86_64", "product_id": "httpd24-httpd-0:2.4.34-23.el7.5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd24-httpd@2.4.34-23.el7.5?arch=x86_64" } } }, { "category": "product_version", "name": "httpd24-httpd-devel-0:2.4.34-23.el7.5.x86_64", "product": { "name": "httpd24-httpd-devel-0:2.4.34-23.el7.5.x86_64", "product_id": "httpd24-httpd-devel-0:2.4.34-23.el7.5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd24-httpd-devel@2.4.34-23.el7.5?arch=x86_64" } } }, { "category": "product_version", "name": "httpd24-httpd-tools-0:2.4.34-23.el7.5.x86_64", "product": { "name": "httpd24-httpd-tools-0:2.4.34-23.el7.5.x86_64", "product_id": "httpd24-httpd-tools-0:2.4.34-23.el7.5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd24-httpd-tools@2.4.34-23.el7.5?arch=x86_64" } } }, { "category": "product_version", "name": "httpd24-mod_ldap-0:2.4.34-23.el7.5.x86_64", "product": { "name": "httpd24-mod_ldap-0:2.4.34-23.el7.5.x86_64", "product_id": "httpd24-mod_ldap-0:2.4.34-23.el7.5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd24-mod_ldap@2.4.34-23.el7.5?arch=x86_64" } } }, { "category": "product_version", "name": "httpd24-mod_proxy_html-1:2.4.34-23.el7.5.x86_64", "product": { "name": "httpd24-mod_proxy_html-1:2.4.34-23.el7.5.x86_64", "product_id": "httpd24-mod_proxy_html-1:2.4.34-23.el7.5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd24-mod_proxy_html@2.4.34-23.el7.5?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "httpd24-mod_session-0:2.4.34-23.el7.5.x86_64", "product": { "name": "httpd24-mod_session-0:2.4.34-23.el7.5.x86_64", "product_id": "httpd24-mod_session-0:2.4.34-23.el7.5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd24-mod_session@2.4.34-23.el7.5?arch=x86_64" } } }, { "category": "product_version", "name": "httpd24-mod_ssl-1:2.4.34-23.el7.5.x86_64", "product": { "name": "httpd24-mod_ssl-1:2.4.34-23.el7.5.x86_64", "product_id": "httpd24-mod_ssl-1:2.4.34-23.el7.5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd24-mod_ssl@2.4.34-23.el7.5?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.x86_64", "product": { "name": "httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.x86_64", "product_id": "httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd24-httpd-debuginfo@2.4.34-23.el7.5?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "httpd24-httpd-manual-0:2.4.34-23.el7.5.noarch", "product": { "name": "httpd24-httpd-manual-0:2.4.34-23.el7.5.noarch", "product_id": "httpd24-httpd-manual-0:2.4.34-23.el7.5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd24-httpd-manual@2.4.34-23.el7.5?arch=noarch" } } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "httpd24-httpd-0:2.4.34-23.el7.5.s390x", "product": { "name": "httpd24-httpd-0:2.4.34-23.el7.5.s390x", "product_id": "httpd24-httpd-0:2.4.34-23.el7.5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd24-httpd@2.4.34-23.el7.5?arch=s390x" } } }, { "category": "product_version", "name": "httpd24-httpd-devel-0:2.4.34-23.el7.5.s390x", "product": { "name": "httpd24-httpd-devel-0:2.4.34-23.el7.5.s390x", "product_id": "httpd24-httpd-devel-0:2.4.34-23.el7.5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd24-httpd-devel@2.4.34-23.el7.5?arch=s390x" } } }, { "category": "product_version", "name": "httpd24-httpd-tools-0:2.4.34-23.el7.5.s390x", "product": { "name": "httpd24-httpd-tools-0:2.4.34-23.el7.5.s390x", "product_id": "httpd24-httpd-tools-0:2.4.34-23.el7.5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd24-httpd-tools@2.4.34-23.el7.5?arch=s390x" } } }, { "category": "product_version", "name": "httpd24-mod_ldap-0:2.4.34-23.el7.5.s390x", "product": { "name": "httpd24-mod_ldap-0:2.4.34-23.el7.5.s390x", "product_id": "httpd24-mod_ldap-0:2.4.34-23.el7.5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd24-mod_ldap@2.4.34-23.el7.5?arch=s390x" } } }, { "category": "product_version", "name": "httpd24-mod_proxy_html-1:2.4.34-23.el7.5.s390x", "product": { "name": "httpd24-mod_proxy_html-1:2.4.34-23.el7.5.s390x", "product_id": "httpd24-mod_proxy_html-1:2.4.34-23.el7.5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd24-mod_proxy_html@2.4.34-23.el7.5?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "httpd24-mod_session-0:2.4.34-23.el7.5.s390x", "product": { "name": "httpd24-mod_session-0:2.4.34-23.el7.5.s390x", "product_id": "httpd24-mod_session-0:2.4.34-23.el7.5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd24-mod_session@2.4.34-23.el7.5?arch=s390x" } } }, { "category": "product_version", "name": "httpd24-mod_ssl-1:2.4.34-23.el7.5.s390x", "product": { "name": "httpd24-mod_ssl-1:2.4.34-23.el7.5.s390x", "product_id": "httpd24-mod_ssl-1:2.4.34-23.el7.5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd24-mod_ssl@2.4.34-23.el7.5?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.s390x", "product": { "name": "httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.s390x", "product_id": "httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd24-httpd-debuginfo@2.4.34-23.el7.5?arch=s390x" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "httpd24-httpd-0:2.4.34-23.el7.5.ppc64le", "product": { "name": "httpd24-httpd-0:2.4.34-23.el7.5.ppc64le", "product_id": "httpd24-httpd-0:2.4.34-23.el7.5.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd24-httpd@2.4.34-23.el7.5?arch=ppc64le" } } }, { "category": "product_version", "name": "httpd24-httpd-devel-0:2.4.34-23.el7.5.ppc64le", "product": { "name": "httpd24-httpd-devel-0:2.4.34-23.el7.5.ppc64le", "product_id": "httpd24-httpd-devel-0:2.4.34-23.el7.5.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd24-httpd-devel@2.4.34-23.el7.5?arch=ppc64le" } } }, { "category": "product_version", "name": "httpd24-httpd-tools-0:2.4.34-23.el7.5.ppc64le", "product": { "name": "httpd24-httpd-tools-0:2.4.34-23.el7.5.ppc64le", "product_id": "httpd24-httpd-tools-0:2.4.34-23.el7.5.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd24-httpd-tools@2.4.34-23.el7.5?arch=ppc64le" } } }, { "category": "product_version", "name": "httpd24-mod_ldap-0:2.4.34-23.el7.5.ppc64le", "product": { "name": "httpd24-mod_ldap-0:2.4.34-23.el7.5.ppc64le", "product_id": "httpd24-mod_ldap-0:2.4.34-23.el7.5.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd24-mod_ldap@2.4.34-23.el7.5?arch=ppc64le" } } }, { "category": "product_version", "name": "httpd24-mod_proxy_html-1:2.4.34-23.el7.5.ppc64le", "product": { "name": "httpd24-mod_proxy_html-1:2.4.34-23.el7.5.ppc64le", "product_id": "httpd24-mod_proxy_html-1:2.4.34-23.el7.5.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd24-mod_proxy_html@2.4.34-23.el7.5?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "httpd24-mod_session-0:2.4.34-23.el7.5.ppc64le", "product": { "name": "httpd24-mod_session-0:2.4.34-23.el7.5.ppc64le", "product_id": "httpd24-mod_session-0:2.4.34-23.el7.5.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd24-mod_session@2.4.34-23.el7.5?arch=ppc64le" } } }, { "category": "product_version", "name": "httpd24-mod_ssl-1:2.4.34-23.el7.5.ppc64le", "product": { "name": "httpd24-mod_ssl-1:2.4.34-23.el7.5.ppc64le", "product_id": "httpd24-mod_ssl-1:2.4.34-23.el7.5.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd24-mod_ssl@2.4.34-23.el7.5?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.ppc64le", "product": { "name": "httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.ppc64le", "product_id": "httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd24-httpd-debuginfo@2.4.34-23.el7.5?arch=ppc64le" } } } ], "category": "architecture", "name": "ppc64le" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "httpd24-httpd-0:2.4.34-23.el7.5.ppc64le as a component of Red Hat Software Collections for RHEL Workstation(v. 7)", "product_id": "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.ppc64le" }, "product_reference": "httpd24-httpd-0:2.4.34-23.el7.5.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.8" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-httpd-0:2.4.34-23.el7.5.s390x as a component of Red Hat Software Collections for RHEL Workstation(v. 7)", "product_id": "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.s390x" }, "product_reference": "httpd24-httpd-0:2.4.34-23.el7.5.s390x", "relates_to_product_reference": "7Server-RHSCL-3.8" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-httpd-0:2.4.34-23.el7.5.src as a component of Red Hat Software Collections for RHEL Workstation(v. 7)", "product_id": "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.src" }, "product_reference": "httpd24-httpd-0:2.4.34-23.el7.5.src", "relates_to_product_reference": "7Server-RHSCL-3.8" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-httpd-0:2.4.34-23.el7.5.x86_64 as a component of Red Hat Software Collections for RHEL Workstation(v. 7)", "product_id": "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.x86_64" }, "product_reference": "httpd24-httpd-0:2.4.34-23.el7.5.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.8" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.ppc64le as a component of Red Hat Software Collections for RHEL Workstation(v. 7)", "product_id": "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.ppc64le" }, "product_reference": "httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.8" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.s390x as a component of Red Hat Software Collections for RHEL Workstation(v. 7)", "product_id": "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.s390x" }, "product_reference": "httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.s390x", "relates_to_product_reference": "7Server-RHSCL-3.8" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.x86_64 as a component of Red Hat Software Collections for RHEL Workstation(v. 7)", "product_id": "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.x86_64" }, "product_reference": "httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.8" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-httpd-devel-0:2.4.34-23.el7.5.ppc64le as a component of Red Hat Software Collections for RHEL Workstation(v. 7)", "product_id": "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.ppc64le" }, "product_reference": "httpd24-httpd-devel-0:2.4.34-23.el7.5.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.8" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-httpd-devel-0:2.4.34-23.el7.5.s390x as a component of Red Hat Software Collections for RHEL Workstation(v. 7)", "product_id": "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.s390x" }, "product_reference": "httpd24-httpd-devel-0:2.4.34-23.el7.5.s390x", "relates_to_product_reference": "7Server-RHSCL-3.8" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-httpd-devel-0:2.4.34-23.el7.5.x86_64 as a component of Red Hat Software Collections for RHEL Workstation(v. 7)", "product_id": "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.x86_64" }, "product_reference": "httpd24-httpd-devel-0:2.4.34-23.el7.5.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.8" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-httpd-manual-0:2.4.34-23.el7.5.noarch as a component of Red Hat Software Collections for RHEL Workstation(v. 7)", "product_id": "7Server-RHSCL-3.8:httpd24-httpd-manual-0:2.4.34-23.el7.5.noarch" }, "product_reference": "httpd24-httpd-manual-0:2.4.34-23.el7.5.noarch", "relates_to_product_reference": "7Server-RHSCL-3.8" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-httpd-tools-0:2.4.34-23.el7.5.ppc64le as a component of Red Hat Software Collections for RHEL Workstation(v. 7)", "product_id": "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.ppc64le" }, "product_reference": "httpd24-httpd-tools-0:2.4.34-23.el7.5.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.8" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-httpd-tools-0:2.4.34-23.el7.5.s390x as a component of Red Hat Software Collections for RHEL Workstation(v. 7)", "product_id": "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.s390x" }, "product_reference": "httpd24-httpd-tools-0:2.4.34-23.el7.5.s390x", "relates_to_product_reference": "7Server-RHSCL-3.8" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-httpd-tools-0:2.4.34-23.el7.5.x86_64 as a component of Red Hat Software Collections for RHEL Workstation(v. 7)", "product_id": "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.x86_64" }, "product_reference": "httpd24-httpd-tools-0:2.4.34-23.el7.5.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.8" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-mod_ldap-0:2.4.34-23.el7.5.ppc64le as a component of Red Hat Software Collections for RHEL Workstation(v. 7)", "product_id": "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.ppc64le" }, "product_reference": "httpd24-mod_ldap-0:2.4.34-23.el7.5.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.8" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-mod_ldap-0:2.4.34-23.el7.5.s390x as a component of Red Hat Software Collections for RHEL Workstation(v. 7)", "product_id": "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.s390x" }, "product_reference": "httpd24-mod_ldap-0:2.4.34-23.el7.5.s390x", "relates_to_product_reference": "7Server-RHSCL-3.8" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-mod_ldap-0:2.4.34-23.el7.5.x86_64 as a component of Red Hat Software Collections for RHEL Workstation(v. 7)", "product_id": "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.x86_64" }, "product_reference": "httpd24-mod_ldap-0:2.4.34-23.el7.5.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.8" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-mod_proxy_html-1:2.4.34-23.el7.5.ppc64le as a component of Red Hat Software Collections for RHEL Workstation(v. 7)", "product_id": "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.ppc64le" }, "product_reference": "httpd24-mod_proxy_html-1:2.4.34-23.el7.5.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.8" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-mod_proxy_html-1:2.4.34-23.el7.5.s390x as a component of Red Hat Software Collections for RHEL Workstation(v. 7)", "product_id": "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.s390x" }, "product_reference": "httpd24-mod_proxy_html-1:2.4.34-23.el7.5.s390x", "relates_to_product_reference": "7Server-RHSCL-3.8" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-mod_proxy_html-1:2.4.34-23.el7.5.x86_64 as a component of Red Hat Software Collections for RHEL Workstation(v. 7)", "product_id": "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.x86_64" }, "product_reference": "httpd24-mod_proxy_html-1:2.4.34-23.el7.5.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.8" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-mod_session-0:2.4.34-23.el7.5.ppc64le as a component of Red Hat Software Collections for RHEL Workstation(v. 7)", "product_id": "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.ppc64le" }, "product_reference": "httpd24-mod_session-0:2.4.34-23.el7.5.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.8" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-mod_session-0:2.4.34-23.el7.5.s390x as a component of Red Hat Software Collections for RHEL Workstation(v. 7)", "product_id": "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.s390x" }, "product_reference": "httpd24-mod_session-0:2.4.34-23.el7.5.s390x", "relates_to_product_reference": "7Server-RHSCL-3.8" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-mod_session-0:2.4.34-23.el7.5.x86_64 as a component of Red Hat Software Collections for RHEL Workstation(v. 7)", "product_id": "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.x86_64" }, "product_reference": "httpd24-mod_session-0:2.4.34-23.el7.5.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.8" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-mod_ssl-1:2.4.34-23.el7.5.ppc64le as a component of Red Hat Software Collections for RHEL Workstation(v. 7)", "product_id": "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.ppc64le" }, "product_reference": "httpd24-mod_ssl-1:2.4.34-23.el7.5.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.8" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-mod_ssl-1:2.4.34-23.el7.5.s390x as a component of Red Hat Software Collections for RHEL Workstation(v. 7)", "product_id": "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.s390x" }, "product_reference": "httpd24-mod_ssl-1:2.4.34-23.el7.5.s390x", "relates_to_product_reference": "7Server-RHSCL-3.8" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-mod_ssl-1:2.4.34-23.el7.5.x86_64 as a component of Red Hat Software Collections for RHEL Workstation(v. 7)", "product_id": "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.x86_64" }, "product_reference": "httpd24-mod_ssl-1:2.4.34-23.el7.5.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.8" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-httpd-0:2.4.34-23.el7.5.ppc64le as a component of Red Hat Software Collections for RHEL(v. 7)", "product_id": "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.ppc64le" }, "product_reference": "httpd24-httpd-0:2.4.34-23.el7.5.ppc64le", "relates_to_product_reference": "7Workstation-RHSCL-3.8" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-httpd-0:2.4.34-23.el7.5.s390x as a component of Red Hat Software Collections for RHEL(v. 7)", "product_id": "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.s390x" }, "product_reference": "httpd24-httpd-0:2.4.34-23.el7.5.s390x", "relates_to_product_reference": "7Workstation-RHSCL-3.8" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-httpd-0:2.4.34-23.el7.5.src as a component of Red Hat Software Collections for RHEL(v. 7)", "product_id": "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.src" }, "product_reference": "httpd24-httpd-0:2.4.34-23.el7.5.src", "relates_to_product_reference": "7Workstation-RHSCL-3.8" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-httpd-0:2.4.34-23.el7.5.x86_64 as a component of Red Hat Software Collections for RHEL(v. 7)", "product_id": "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.x86_64" }, "product_reference": "httpd24-httpd-0:2.4.34-23.el7.5.x86_64", "relates_to_product_reference": "7Workstation-RHSCL-3.8" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.ppc64le as a component of Red Hat Software Collections for RHEL(v. 7)", "product_id": "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.ppc64le" }, "product_reference": "httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.ppc64le", "relates_to_product_reference": "7Workstation-RHSCL-3.8" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.s390x as a component of Red Hat Software Collections for RHEL(v. 7)", "product_id": "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.s390x" }, "product_reference": "httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.s390x", "relates_to_product_reference": "7Workstation-RHSCL-3.8" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.x86_64 as a component of Red Hat Software Collections for RHEL(v. 7)", "product_id": "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.x86_64" }, "product_reference": "httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.x86_64", "relates_to_product_reference": "7Workstation-RHSCL-3.8" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-httpd-devel-0:2.4.34-23.el7.5.ppc64le as a component of Red Hat Software Collections for RHEL(v. 7)", "product_id": "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.ppc64le" }, "product_reference": "httpd24-httpd-devel-0:2.4.34-23.el7.5.ppc64le", "relates_to_product_reference": "7Workstation-RHSCL-3.8" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-httpd-devel-0:2.4.34-23.el7.5.s390x as a component of Red Hat Software Collections for RHEL(v. 7)", "product_id": "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.s390x" }, "product_reference": "httpd24-httpd-devel-0:2.4.34-23.el7.5.s390x", "relates_to_product_reference": "7Workstation-RHSCL-3.8" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-httpd-devel-0:2.4.34-23.el7.5.x86_64 as a component of Red Hat Software Collections for RHEL(v. 7)", "product_id": "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.x86_64" }, "product_reference": "httpd24-httpd-devel-0:2.4.34-23.el7.5.x86_64", "relates_to_product_reference": "7Workstation-RHSCL-3.8" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-httpd-manual-0:2.4.34-23.el7.5.noarch as a component of Red Hat Software Collections for RHEL(v. 7)", "product_id": "7Workstation-RHSCL-3.8:httpd24-httpd-manual-0:2.4.34-23.el7.5.noarch" }, "product_reference": "httpd24-httpd-manual-0:2.4.34-23.el7.5.noarch", "relates_to_product_reference": "7Workstation-RHSCL-3.8" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-httpd-tools-0:2.4.34-23.el7.5.ppc64le as a component of Red Hat Software Collections for RHEL(v. 7)", "product_id": "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.ppc64le" }, "product_reference": "httpd24-httpd-tools-0:2.4.34-23.el7.5.ppc64le", "relates_to_product_reference": "7Workstation-RHSCL-3.8" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-httpd-tools-0:2.4.34-23.el7.5.s390x as a component of Red Hat Software Collections for RHEL(v. 7)", "product_id": "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.s390x" }, "product_reference": "httpd24-httpd-tools-0:2.4.34-23.el7.5.s390x", "relates_to_product_reference": "7Workstation-RHSCL-3.8" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-httpd-tools-0:2.4.34-23.el7.5.x86_64 as a component of Red Hat Software Collections for RHEL(v. 7)", "product_id": "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.x86_64" }, "product_reference": "httpd24-httpd-tools-0:2.4.34-23.el7.5.x86_64", "relates_to_product_reference": "7Workstation-RHSCL-3.8" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-mod_ldap-0:2.4.34-23.el7.5.ppc64le as a component of Red Hat Software Collections for RHEL(v. 7)", "product_id": "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.ppc64le" }, "product_reference": "httpd24-mod_ldap-0:2.4.34-23.el7.5.ppc64le", "relates_to_product_reference": "7Workstation-RHSCL-3.8" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-mod_ldap-0:2.4.34-23.el7.5.s390x as a component of Red Hat Software Collections for RHEL(v. 7)", "product_id": "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.s390x" }, "product_reference": "httpd24-mod_ldap-0:2.4.34-23.el7.5.s390x", "relates_to_product_reference": "7Workstation-RHSCL-3.8" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-mod_ldap-0:2.4.34-23.el7.5.x86_64 as a component of Red Hat Software Collections for RHEL(v. 7)", "product_id": "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.x86_64" }, "product_reference": "httpd24-mod_ldap-0:2.4.34-23.el7.5.x86_64", "relates_to_product_reference": "7Workstation-RHSCL-3.8" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-mod_proxy_html-1:2.4.34-23.el7.5.ppc64le as a component of Red Hat Software Collections for RHEL(v. 7)", "product_id": "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.ppc64le" }, "product_reference": "httpd24-mod_proxy_html-1:2.4.34-23.el7.5.ppc64le", "relates_to_product_reference": "7Workstation-RHSCL-3.8" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-mod_proxy_html-1:2.4.34-23.el7.5.s390x as a component of Red Hat Software Collections for RHEL(v. 7)", "product_id": "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.s390x" }, "product_reference": "httpd24-mod_proxy_html-1:2.4.34-23.el7.5.s390x", "relates_to_product_reference": "7Workstation-RHSCL-3.8" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-mod_proxy_html-1:2.4.34-23.el7.5.x86_64 as a component of Red Hat Software Collections for RHEL(v. 7)", "product_id": "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.x86_64" }, "product_reference": "httpd24-mod_proxy_html-1:2.4.34-23.el7.5.x86_64", "relates_to_product_reference": "7Workstation-RHSCL-3.8" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-mod_session-0:2.4.34-23.el7.5.ppc64le as a component of Red Hat Software Collections for RHEL(v. 7)", "product_id": "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.ppc64le" }, "product_reference": "httpd24-mod_session-0:2.4.34-23.el7.5.ppc64le", "relates_to_product_reference": "7Workstation-RHSCL-3.8" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-mod_session-0:2.4.34-23.el7.5.s390x as a component of Red Hat Software Collections for RHEL(v. 7)", "product_id": "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.s390x" }, "product_reference": "httpd24-mod_session-0:2.4.34-23.el7.5.s390x", "relates_to_product_reference": "7Workstation-RHSCL-3.8" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-mod_session-0:2.4.34-23.el7.5.x86_64 as a component of Red Hat Software Collections for RHEL(v. 7)", "product_id": "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.x86_64" }, "product_reference": "httpd24-mod_session-0:2.4.34-23.el7.5.x86_64", "relates_to_product_reference": "7Workstation-RHSCL-3.8" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-mod_ssl-1:2.4.34-23.el7.5.ppc64le as a component of Red Hat Software Collections for RHEL(v. 7)", "product_id": "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.ppc64le" }, "product_reference": "httpd24-mod_ssl-1:2.4.34-23.el7.5.ppc64le", "relates_to_product_reference": "7Workstation-RHSCL-3.8" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-mod_ssl-1:2.4.34-23.el7.5.s390x as a component of Red Hat Software Collections for RHEL(v. 7)", "product_id": "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.s390x" }, "product_reference": "httpd24-mod_ssl-1:2.4.34-23.el7.5.s390x", "relates_to_product_reference": "7Workstation-RHSCL-3.8" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-mod_ssl-1:2.4.34-23.el7.5.x86_64 as a component of Red Hat Software Collections for RHEL(v. 7)", "product_id": "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.x86_64" }, "product_reference": "httpd24-mod_ssl-1:2.4.34-23.el7.5.x86_64", "relates_to_product_reference": "7Workstation-RHSCL-3.8" } ] }, "vulnerabilities": [ { "cve": "CVE-2021-33193", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "discovery_date": "2021-05-27T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1966728" } ], "notes": [ { "category": "description", "text": "A NULL pointer dereference was found in Apache httpd mod_h2. The highest threat from this flaw is to system integrity.", "title": "Vulnerability description" }, { "category": "summary", "text": "httpd: Request splitting via HTTP/2 method injection and mod_proxy", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.src", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-manual-0:2.4.34-23.el7.5.noarch", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.src", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-manual-0:2.4.34-23.el7.5.noarch", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-33193" }, { "category": "external", "summary": "RHBZ#1966728", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1966728" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-33193", "url": "https://www.cve.org/CVERecord?id=CVE-2021-33193" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-33193", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-33193" }, { "category": "external", "summary": "https://portswigger.net/research/http2", "url": "https://portswigger.net/research/http2" } ], "release_date": "2021-08-05T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-09-29T13:33:06+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically.", "product_ids": [ "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.src", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-manual-0:2.4.34-23.el7.5.noarch", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.src", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-manual-0:2.4.34-23.el7.5.noarch", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:6753" }, { "category": "workaround", "details": "This flaw can be mitigated by disabling HTTP/2. More information available at: https://httpd.apache.org/docs/2.4/mod/mod_http2.html", "product_ids": [ "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.src", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-manual-0:2.4.34-23.el7.5.noarch", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.src", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-manual-0:2.4.34-23.el7.5.noarch", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.src", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-manual-0:2.4.34-23.el7.5.noarch", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.src", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-manual-0:2.4.34-23.el7.5.noarch", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "httpd: Request splitting via HTTP/2 method injection and mod_proxy" }, { "cve": "CVE-2021-34798", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "discovery_date": "2021-09-16T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2005128" } ], "notes": [ { "category": "description", "text": "A NULL pointer dereference in httpd allows an unauthenticated remote attacker to crash httpd by providing malformed HTTP requests. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "httpd: NULL pointer dereference via malformed requests", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.src", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-manual-0:2.4.34-23.el7.5.noarch", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.src", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-manual-0:2.4.34-23.el7.5.noarch", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-34798" }, { "category": "external", "summary": "RHBZ#2005128", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2005128" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-34798", "url": "https://www.cve.org/CVERecord?id=CVE-2021-34798" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-34798", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-34798" }, { "category": "external", "summary": "https://httpd.apache.org/security/vulnerabilities_24.html", "url": "https://httpd.apache.org/security/vulnerabilities_24.html" } ], "release_date": "2021-09-16T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-09-29T13:33:06+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically.", "product_ids": [ "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.src", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-manual-0:2.4.34-23.el7.5.noarch", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.src", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-manual-0:2.4.34-23.el7.5.noarch", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:6753" }, { "category": "workaround", "details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example.", "product_ids": [ "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.src", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-manual-0:2.4.34-23.el7.5.noarch", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.src", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-manual-0:2.4.34-23.el7.5.noarch", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.src", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-manual-0:2.4.34-23.el7.5.noarch", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.src", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-manual-0:2.4.34-23.el7.5.noarch", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "httpd: NULL pointer dereference via malformed requests" }, { "cve": "CVE-2021-36160", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "discovery_date": "2021-09-16T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2005124" } ], "notes": [ { "category": "description", "text": "An out-of-bounds read in mod_proxy_uwsgi of httpd allows a remote unauthenticated attacker to crash the service through a crafted request. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "httpd: mod_proxy_uwsgi: out-of-bounds read via a crafted request uri-path", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.src", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-manual-0:2.4.34-23.el7.5.noarch", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.src", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-manual-0:2.4.34-23.el7.5.noarch", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-36160" }, { "category": "external", "summary": "RHBZ#2005124", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2005124" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-36160", "url": "https://www.cve.org/CVERecord?id=CVE-2021-36160" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-36160", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-36160" } ], "release_date": "2021-09-16T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-09-29T13:33:06+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically.", "product_ids": [ "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.src", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-manual-0:2.4.34-23.el7.5.noarch", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.src", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-manual-0:2.4.34-23.el7.5.noarch", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:6753" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.src", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-manual-0:2.4.34-23.el7.5.noarch", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.src", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-manual-0:2.4.34-23.el7.5.noarch", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.src", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-manual-0:2.4.34-23.el7.5.noarch", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.src", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-manual-0:2.4.34-23.el7.5.noarch", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "httpd: mod_proxy_uwsgi: out-of-bounds read via a crafted request uri-path" }, { "cve": "CVE-2021-39275", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "discovery_date": "2021-09-16T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2005119" } ], "notes": [ { "category": "description", "text": "An out-of-bounds write in function ap_escape_quotes of httpd allows an unauthenticated remote attacker to crash the server or potentially execute code on the system with the privileges of the httpd user, by providing malicious input to the function.", "title": "Vulnerability description" }, { "category": "summary", "text": "httpd: Out-of-bounds write in ap_escape_quotes() via malicious input", "title": "Vulnerability summary" }, { "category": "other", "text": "No httpd module in Red Hat Enterprise Linux and Red Hat Software Collections pass untrusted data to ap_escape_quotes function, thus the Impact of the flaw has been set to Moderate.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.src", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-manual-0:2.4.34-23.el7.5.noarch", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.src", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-manual-0:2.4.34-23.el7.5.noarch", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-39275" }, { "category": "external", "summary": "RHBZ#2005119", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2005119" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-39275", "url": "https://www.cve.org/CVERecord?id=CVE-2021-39275" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-39275", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-39275" } ], "release_date": "2021-09-16T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-09-29T13:33:06+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically.", "product_ids": [ "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.src", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-manual-0:2.4.34-23.el7.5.noarch", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.src", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-manual-0:2.4.34-23.el7.5.noarch", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:6753" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.src", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-manual-0:2.4.34-23.el7.5.noarch", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.src", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-manual-0:2.4.34-23.el7.5.noarch", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.src", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-manual-0:2.4.34-23.el7.5.noarch", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.src", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-manual-0:2.4.34-23.el7.5.noarch", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "httpd: Out-of-bounds write in ap_escape_quotes() via malicious input" }, { "cve": "CVE-2021-44224", "cwe": { "id": "CWE-918", "name": "Server-Side Request Forgery (SSRF)" }, "discovery_date": "2021-12-20T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2034672" } ], "notes": [ { "category": "description", "text": "There\u0027s a null pointer dereference and server-side request forgery flaw in httpd\u0027s mod_proxy module, when it is configured to be used as a forward proxy. A crafted packet could be sent on the adjacent network to the forward proxy that could cause a crash, or potentially SSRF via misdirected Unix Domain Socket requests. In the worst case, this could cause a denial of service or compromise to confidentiality of data.", "title": "Vulnerability description" }, { "category": "summary", "text": "httpd: possible NULL dereference or SSRF in forward proxy configurations", "title": "Vulnerability summary" }, { "category": "other", "text": "This flaw does not affect httpd configurations that do not use forward proxy functionality (configurations where ProxyRequests is turned off).", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.src", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-manual-0:2.4.34-23.el7.5.noarch", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.src", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-manual-0:2.4.34-23.el7.5.noarch", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-44224" }, { "category": "external", "summary": "RHBZ#2034672", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2034672" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-44224", "url": "https://www.cve.org/CVERecord?id=CVE-2021-44224" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-44224", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-44224" }, { "category": "external", "summary": "http://httpd.apache.org/security/vulnerabilities_24.html", "url": "http://httpd.apache.org/security/vulnerabilities_24.html" } ], "release_date": "2021-12-20T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-09-29T13:33:06+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically.", "product_ids": [ "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.src", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-manual-0:2.4.34-23.el7.5.noarch", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.src", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-manual-0:2.4.34-23.el7.5.noarch", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:6753" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.src", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-manual-0:2.4.34-23.el7.5.noarch", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.src", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-manual-0:2.4.34-23.el7.5.noarch", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.1, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:H", "version": "3.1" }, "products": [ "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.src", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-manual-0:2.4.34-23.el7.5.noarch", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.src", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-manual-0:2.4.34-23.el7.5.noarch", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "httpd: possible NULL dereference or SSRF in forward proxy configurations" }, { "cve": "CVE-2022-22719", "cwe": { "id": "CWE-908", "name": "Use of Uninitialized Resource" }, "discovery_date": "2022-03-15T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2064322" } ], "notes": [ { "category": "description", "text": "A flaw was found in the mod_lua module of httpd. A crafted request body can cause a read to a random memory area due to an uninitialized value in functions called by the parsebody function. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "httpd: mod_lua: Use of uninitialized value of in r:parsebody", "title": "Vulnerability summary" }, { "category": "other", "text": "httpd as shipped with Red Hat Enterprise Linux 6, is not affected by this flaw because it does not ship mod_lua.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.src", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-manual-0:2.4.34-23.el7.5.noarch", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.src", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-manual-0:2.4.34-23.el7.5.noarch", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-22719" }, { "category": "external", "summary": "RHBZ#2064322", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2064322" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-22719", "url": "https://www.cve.org/CVERecord?id=CVE-2022-22719" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-22719", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-22719" }, { "category": "external", "summary": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2022-22719", "url": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2022-22719" } ], "release_date": "2022-03-14T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-09-29T13:33:06+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically.", "product_ids": [ "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.src", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-manual-0:2.4.34-23.el7.5.noarch", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.src", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-manual-0:2.4.34-23.el7.5.noarch", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:6753" }, { "category": "workaround", "details": "Disabling mod_lua and restarting httpd will mitigate this flaw. See https://access.redhat.com/articles/10649 for more information.", "product_ids": [ "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.src", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-manual-0:2.4.34-23.el7.5.noarch", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.src", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-manual-0:2.4.34-23.el7.5.noarch", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.src", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-manual-0:2.4.34-23.el7.5.noarch", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.src", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-manual-0:2.4.34-23.el7.5.noarch", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "httpd: mod_lua: Use of uninitialized value of in r:parsebody" }, { "cve": "CVE-2022-22721", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "discovery_date": "2022-03-15T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2064320" } ], "notes": [ { "category": "description", "text": "A flaw was found in httpd, where it incorrectly limits the value of the LimitXMLRequestBody option. This issue can lead to an integer overflow and later causes an out-of-bounds write.", "title": "Vulnerability description" }, { "category": "summary", "text": "httpd: core: Possible buffer overflow with very large or unlimited LimitXMLRequestBody", "title": "Vulnerability summary" }, { "category": "other", "text": "The default configuration of the LimitXMLRequestBody option on RHEL is 1MB and therefore is not vulnerable to this flaw. Also, this issue is known to only affect 32bit httpd builds.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.src", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-manual-0:2.4.34-23.el7.5.noarch", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.src", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-manual-0:2.4.34-23.el7.5.noarch", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-22721" }, { "category": "external", "summary": "RHBZ#2064320", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2064320" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-22721", "url": "https://www.cve.org/CVERecord?id=CVE-2022-22721" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-22721", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-22721" }, { "category": "external", "summary": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2022-22721", "url": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2022-22721" } ], "release_date": "2022-03-14T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-09-29T13:33:06+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically.", "product_ids": [ "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.src", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-manual-0:2.4.34-23.el7.5.noarch", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.src", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-manual-0:2.4.34-23.el7.5.noarch", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:6753" }, { "category": "workaround", "details": "Set the LimitXMLRequestBody option to a value smaller than 350MB. Setting it to 0 is not recommended as it will use a hard limit (depending on 32bit or 64bit systems) which may result in an overall system out-of-memory. The default configuration is not vulnerable to this flaw, see the statement above.", "product_ids": [ "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.src", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-manual-0:2.4.34-23.el7.5.noarch", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.src", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-manual-0:2.4.34-23.el7.5.noarch", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.4, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:H", "version": "3.1" }, "products": [ "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.src", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-manual-0:2.4.34-23.el7.5.noarch", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.src", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-manual-0:2.4.34-23.el7.5.noarch", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "httpd: core: Possible buffer overflow with very large or unlimited LimitXMLRequestBody" }, { "cve": "CVE-2022-23943", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "discovery_date": "2022-03-15T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2064319" } ], "notes": [ { "category": "description", "text": "An out-of-bounds read/write vulnerability was found in the mod_sed module of httpd. This flaw allows an attacker to overwrite the memory of an httpd instance that is using mod_sed with data provided by the attacker.", "title": "Vulnerability description" }, { "category": "summary", "text": "httpd: mod_sed: Read/write beyond bounds", "title": "Vulnerability summary" }, { "category": "other", "text": "The `mod_sed` module is disabled by default on Red Hat Enterprise Linux 7 and 8. For this reason, the flaw has been rated as having a security impact of Moderate. The httpd package as shipped with Red Hat Enterprise Linux 6 is not affected by this flaw because the `mod_sed` module is available only in httpd 2.3 and later.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.src", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-manual-0:2.4.34-23.el7.5.noarch", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.src", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-manual-0:2.4.34-23.el7.5.noarch", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-23943" }, { "category": "external", "summary": "RHBZ#2064319", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2064319" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-23943", "url": "https://www.cve.org/CVERecord?id=CVE-2022-23943" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-23943", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-23943" }, { "category": "external", "summary": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2022-23943", "url": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2022-23943" } ], "release_date": "2022-03-14T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-09-29T13:33:06+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically.", "product_ids": [ "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.src", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-manual-0:2.4.34-23.el7.5.noarch", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.src", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-manual-0:2.4.34-23.el7.5.noarch", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:6753" }, { "category": "workaround", "details": "Disabling mod_sed and restarting httpd will mitigate this flaw. See https://access.redhat.com/articles/10649 for more information.", "product_ids": [ "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.src", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-manual-0:2.4.34-23.el7.5.noarch", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.src", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-manual-0:2.4.34-23.el7.5.noarch", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.src", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-manual-0:2.4.34-23.el7.5.noarch", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.src", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-manual-0:2.4.34-23.el7.5.noarch", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "httpd: mod_sed: Read/write beyond bounds" }, { "cve": "CVE-2022-26377", "cwe": { "id": "CWE-444", "name": "Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027)" }, "discovery_date": "2022-06-08T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2094997" } ], "notes": [ { "category": "description", "text": "An HTTP request smuggling vulnerability was found in the mod_proxy_ajp module of httpd. This flaw allows an attacker to smuggle requests to the AJP server, where it forwards requests.", "title": "Vulnerability description" }, { "category": "summary", "text": "httpd: mod_proxy_ajp: Possible request smuggling", "title": "Vulnerability summary" }, { "category": "other", "text": "The httpd mod_proxy_ajp module is enabled by default on Red Hat Enterprise Linux 8, 9, and in RHSCL. However, there are no directives forwarding requests using the AJP protocol.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.src", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-manual-0:2.4.34-23.el7.5.noarch", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.src", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-manual-0:2.4.34-23.el7.5.noarch", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-26377" }, { "category": "external", "summary": "RHBZ#2094997", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2094997" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-26377", "url": "https://www.cve.org/CVERecord?id=CVE-2022-26377" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-26377", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-26377" }, { "category": "external", "summary": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2022-26377", "url": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2022-26377" } ], "release_date": "2022-06-08T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-09-29T13:33:06+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically.", "product_ids": [ "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.src", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-manual-0:2.4.34-23.el7.5.noarch", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.src", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-manual-0:2.4.34-23.el7.5.noarch", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:6753" }, { "category": "workaround", "details": "Disabling mod_proxy_ajp and restarting httpd will mitigate this flaw.", "product_ids": [ "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.src", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-manual-0:2.4.34-23.el7.5.noarch", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.src", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-manual-0:2.4.34-23.el7.5.noarch", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:L", "version": "3.1" }, "products": [ "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.src", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-manual-0:2.4.34-23.el7.5.noarch", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.src", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-manual-0:2.4.34-23.el7.5.noarch", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "httpd: mod_proxy_ajp: Possible request smuggling" }, { "cve": "CVE-2022-28614", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2022-06-08T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2095002" } ], "notes": [ { "category": "description", "text": "An out-of-bounds read vulnerability was found in httpd. A very large input to the ap_rputs and ap_rwrite functions can lead to an integer overflow and result in an out-of-bounds read.", "title": "Vulnerability description" }, { "category": "summary", "text": "httpd: Out-of-bounds read via ap_rwrite()", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.src", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-manual-0:2.4.34-23.el7.5.noarch", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.src", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-manual-0:2.4.34-23.el7.5.noarch", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-28614" }, { "category": "external", "summary": "RHBZ#2095002", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2095002" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-28614", "url": "https://www.cve.org/CVERecord?id=CVE-2022-28614" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-28614", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-28614" }, { "category": "external", "summary": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2022-28614", "url": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2022-28614" } ], "release_date": "2022-06-08T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-09-29T13:33:06+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically.", "product_ids": [ "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.src", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-manual-0:2.4.34-23.el7.5.noarch", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.src", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-manual-0:2.4.34-23.el7.5.noarch", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:6753" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.src", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-manual-0:2.4.34-23.el7.5.noarch", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.src", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-manual-0:2.4.34-23.el7.5.noarch", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "httpd: Out-of-bounds read via ap_rwrite()" }, { "cve": "CVE-2022-28615", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "discovery_date": "2022-06-08T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2095006" } ], "notes": [ { "category": "description", "text": "An out-of-bounds read vulnerability was found in httpd. A very large input to the ap_strcmp_match function can lead to an integer overflow and result in an out-of-bounds read.", "title": "Vulnerability description" }, { "category": "summary", "text": "httpd: Out-of-bounds read in ap_strcmp_match()", "title": "Vulnerability summary" }, { "category": "other", "text": "According to upstream, no code distributed with the httpd server can exploit this flaw, however, third-party modules or Lua scripts that use the ap_strcmp_match function could potentially be affected.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.src", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-manual-0:2.4.34-23.el7.5.noarch", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.src", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-manual-0:2.4.34-23.el7.5.noarch", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-28615" }, { "category": "external", "summary": "RHBZ#2095006", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2095006" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-28615", "url": "https://www.cve.org/CVERecord?id=CVE-2022-28615" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-28615", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-28615" }, { "category": "external", "summary": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2022-28615", "url": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2022-28615" } ], "release_date": "2022-06-08T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-09-29T13:33:06+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically.", "product_ids": [ "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.src", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-manual-0:2.4.34-23.el7.5.noarch", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.src", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-manual-0:2.4.34-23.el7.5.noarch", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:6753" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.4, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H", "version": "3.1" }, "products": [ "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.src", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-manual-0:2.4.34-23.el7.5.noarch", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.src", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-manual-0:2.4.34-23.el7.5.noarch", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "httpd: Out-of-bounds read in ap_strcmp_match()" }, { "cve": "CVE-2022-29404", "cwe": { "id": "CWE-770", "name": "Allocation of Resources Without Limits or Throttling" }, "discovery_date": "2022-06-08T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2095012" } ], "notes": [ { "category": "description", "text": "A flaw was found in the mod_lua module of httpd. A malicious request to a Lua script that calls parsebody(0) can lead to a denial of service due to no default limit on the possible input size.", "title": "Vulnerability description" }, { "category": "summary", "text": "httpd: mod_lua: DoS in r:parsebody", "title": "Vulnerability summary" }, { "category": "other", "text": "httpd as shipped with Red Hat Enterprise Linux 6, is not affected by this flaw because it does not ship mod_lua.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.src", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-manual-0:2.4.34-23.el7.5.noarch", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.src", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-manual-0:2.4.34-23.el7.5.noarch", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-29404" }, { "category": "external", "summary": "RHBZ#2095012", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2095012" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-29404", "url": "https://www.cve.org/CVERecord?id=CVE-2022-29404" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-29404", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-29404" }, { "category": "external", "summary": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2022-29404", "url": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2022-29404" } ], "release_date": "2022-06-08T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-09-29T13:33:06+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically.", "product_ids": [ "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.src", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-manual-0:2.4.34-23.el7.5.noarch", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.src", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-manual-0:2.4.34-23.el7.5.noarch", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:6753" }, { "category": "workaround", "details": "Disabling mod_lua and restarting httpd will mitigate this flaw.", "product_ids": [ "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.src", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-manual-0:2.4.34-23.el7.5.noarch", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.src", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-manual-0:2.4.34-23.el7.5.noarch", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.src", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-manual-0:2.4.34-23.el7.5.noarch", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.src", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-manual-0:2.4.34-23.el7.5.noarch", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "httpd: mod_lua: DoS in r:parsebody" }, { "cve": "CVE-2022-30522", "cwe": { "id": "CWE-789", "name": "Memory Allocation with Excessive Size Value" }, "discovery_date": "2022-06-08T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2095015" } ], "notes": [ { "category": "description", "text": "A flaw was found in the mod_sed module of httpd. A very large input to the mod_sed module can result in a denial of service due to excessively large memory allocations.", "title": "Vulnerability description" }, { "category": "summary", "text": "httpd: mod_sed: DoS vulnerability", "title": "Vulnerability summary" }, { "category": "other", "text": "The mod_sed module is disabled by default on Red Hat Enterprise Linux 7 and 8. The httpd package as shipped with Red Hat Enterprise Linux 6 is not affected by this flaw because the mod_sed module is not available.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.src", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-manual-0:2.4.34-23.el7.5.noarch", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.src", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-manual-0:2.4.34-23.el7.5.noarch", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-30522" }, { "category": "external", "summary": "RHBZ#2095015", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2095015" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-30522", "url": "https://www.cve.org/CVERecord?id=CVE-2022-30522" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-30522", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-30522" }, { "category": "external", "summary": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2022-30522", "url": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2022-30522" } ], "release_date": "2022-06-08T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-09-29T13:33:06+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically.", "product_ids": [ "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.src", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-manual-0:2.4.34-23.el7.5.noarch", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.src", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-manual-0:2.4.34-23.el7.5.noarch", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:6753" }, { "category": "workaround", "details": "Disabling mod_sed and restating httpd will mitigate this flaw.", "product_ids": [ "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.src", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-manual-0:2.4.34-23.el7.5.noarch", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.src", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-manual-0:2.4.34-23.el7.5.noarch", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.src", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-manual-0:2.4.34-23.el7.5.noarch", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.src", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-manual-0:2.4.34-23.el7.5.noarch", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "httpd: mod_sed: DoS vulnerability" }, { "cve": "CVE-2022-30556", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2022-06-08T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2095018" } ], "notes": [ { "category": "description", "text": "A flaw was found in the mod_lua module of httpd. The data returned by the wsread function may point past the end of the storage allocated for the buffer, resulting in information disclosure.", "title": "Vulnerability description" }, { "category": "summary", "text": "httpd: mod_lua: Information disclosure with websockets", "title": "Vulnerability summary" }, { "category": "other", "text": "httpd as shipped with Red Hat Enterprise Linux 6, is not affected by this flaw because it does not ship mod_lua. Red Hat Enterprise Linux 7 is not affected by this flaw because the wsread function is not available.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.src", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-manual-0:2.4.34-23.el7.5.noarch", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.src", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-manual-0:2.4.34-23.el7.5.noarch", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-30556" }, { "category": "external", "summary": "RHBZ#2095018", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2095018" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-30556", "url": "https://www.cve.org/CVERecord?id=CVE-2022-30556" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-30556", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-30556" }, { "category": "external", "summary": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2022-30556", "url": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2022-30556" } ], "release_date": "2022-06-08T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-09-29T13:33:06+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically.", "product_ids": [ "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.src", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-manual-0:2.4.34-23.el7.5.noarch", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.src", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-manual-0:2.4.34-23.el7.5.noarch", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:6753" }, { "category": "workaround", "details": "Disabling mod_lua and restarting httpd will mitigate this flaw.", "product_ids": [ "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.src", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-manual-0:2.4.34-23.el7.5.noarch", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.src", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-manual-0:2.4.34-23.el7.5.noarch", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.src", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-manual-0:2.4.34-23.el7.5.noarch", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.src", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-manual-0:2.4.34-23.el7.5.noarch", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "httpd: mod_lua: Information disclosure with websockets" }, { "cve": "CVE-2022-31813", "cwe": { "id": "CWE-348", "name": "Use of Less Trusted Source" }, "discovery_date": "2022-06-08T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2095020" } ], "notes": [ { "category": "description", "text": "A flaw was found in the mod_proxy module of httpd. The server may remove the X-Forwarded-* headers from a request based on the client-side Connection header hop-by-hop mechanism.", "title": "Vulnerability description" }, { "category": "summary", "text": "httpd: mod_proxy: X-Forwarded-For dropped by hop-by-hop mechanism", "title": "Vulnerability summary" }, { "category": "other", "text": "This flaw has been rated as having a security impact of Moderate, and is not currently planned to be addressed in future updates of Red Hat Enterprise Linux 7. Red Hat Enterprise Linux 7 is now in Maintenance Support 2 Phase of the support and maintenance life cycle. For additional information, refer to the Red Hat Enterprise Linux Life Cycle: https://access.redhat.com/support/policy/updates/errata.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.src", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-manual-0:2.4.34-23.el7.5.noarch", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.src", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-manual-0:2.4.34-23.el7.5.noarch", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-31813" }, { "category": "external", "summary": "RHBZ#2095020", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2095020" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-31813", "url": "https://www.cve.org/CVERecord?id=CVE-2022-31813" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-31813", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-31813" }, { "category": "external", "summary": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2022-31813", "url": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2022-31813" } ], "release_date": "2022-06-08T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-09-29T13:33:06+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically.", "product_ids": [ "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.src", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-manual-0:2.4.34-23.el7.5.noarch", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.src", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-manual-0:2.4.34-23.el7.5.noarch", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:6753" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.src", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-manual-0:2.4.34-23.el7.5.noarch", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.src", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-manual-0:2.4.34-23.el7.5.noarch", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 7.3, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" }, "products": [ "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.src", "7Server-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-httpd-manual-0:2.4.34-23.el7.5.noarch", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.x86_64", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.ppc64le", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.s390x", "7Server-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.src", "7Workstation-RHSCL-3.8:httpd24-httpd-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-debuginfo-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-devel-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-httpd-manual-0:2.4.34-23.el7.5.noarch", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-httpd-tools-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_ldap-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_proxy_html-1:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_session-0:2.4.34-23.el7.5.x86_64", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.ppc64le", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.s390x", "7Workstation-RHSCL-3.8:httpd24-mod_ssl-1:2.4.34-23.el7.5.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "httpd: mod_proxy: X-Forwarded-For dropped by hop-by-hop mechanism" } ] }
rhsa-2022_7647
Vulnerability from csaf_redhat
Published
2022-11-08 09:35
Modified
2024-11-15 15:00
Summary
Red Hat Security Advisory: httpd:2.4 security update
Notes
Topic
An update for the httpd:2.4 module is now available for Red Hat Enterprise Linux 8.
Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
The httpd packages provide the Apache HTTP Server, a powerful, efficient, and extensible web server.
Security Fix(es):
* httpd: mod_sed: Read/write beyond bounds (CVE-2022-23943)
* httpd: mod_lua: Use of uninitialized value of in r:parsebody (CVE-2022-22719)
* httpd: core: Possible buffer overflow with very large or unlimited LimitXMLRequestBody (CVE-2022-22721)
* httpd: mod_proxy_ajp: Possible request smuggling (CVE-2022-26377)
* httpd: mod_lua: DoS in r:parsebody (CVE-2022-29404)
* httpd: mod_sed: DoS vulnerability (CVE-2022-30522)
* httpd: mod_proxy: X-Forwarded-For dropped by hop-by-hop mechanism (CVE-2022-31813)
* httpd: Out-of-bounds read via ap_rwrite() (CVE-2022-28614)
* httpd: Out-of-bounds read in ap_strcmp_match() (CVE-2022-28615)
* httpd: mod_lua: Information disclosure with websockets (CVE-2022-30556)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.7 Release Notes linked from the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for the httpd:2.4 module is now available for Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "The httpd packages provide the Apache HTTP Server, a powerful, efficient, and extensible web server.\n\nSecurity Fix(es):\n\n* httpd: mod_sed: Read/write beyond bounds (CVE-2022-23943)\n\n* httpd: mod_lua: Use of uninitialized value of in r:parsebody (CVE-2022-22719)\n\n* httpd: core: Possible buffer overflow with very large or unlimited LimitXMLRequestBody (CVE-2022-22721)\n\n* httpd: mod_proxy_ajp: Possible request smuggling (CVE-2022-26377)\n\n* httpd: mod_lua: DoS in r:parsebody (CVE-2022-29404)\n\n* httpd: mod_sed: DoS vulnerability (CVE-2022-30522)\n\n* httpd: mod_proxy: X-Forwarded-For dropped by hop-by-hop mechanism (CVE-2022-31813)\n\n* httpd: Out-of-bounds read via ap_rwrite() (CVE-2022-28614)\n\n* httpd: Out-of-bounds read in ap_strcmp_match() (CVE-2022-28615)\n\n* httpd: mod_lua: Information disclosure with websockets (CVE-2022-30556)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.7 Release Notes linked from the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2022:7647", "url": "https://access.redhat.com/errata/RHSA-2022:7647" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/8/html/8.7_release_notes/index", "url": "https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/8/html/8.7_release_notes/index" }, { "category": "external", "summary": "2064319", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2064319" }, { "category": "external", "summary": "2064320", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2064320" }, { "category": "external", "summary": "2064322", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2064322" }, { "category": "external", "summary": "2094997", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2094997" }, { "category": "external", "summary": "2095002", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2095002" }, { "category": "external", "summary": "2095006", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2095006" }, { "category": "external", "summary": "2095012", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2095012" }, { "category": "external", "summary": "2095015", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2095015" }, { "category": "external", "summary": "2095018", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2095018" }, { "category": "external", "summary": "2095020", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2095020" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2022/rhsa-2022_7647.json" } ], "title": "Red Hat Security Advisory: httpd:2.4 security update", "tracking": { "current_release_date": "2024-11-15T15:00:45+00:00", "generator": { "date": "2024-11-15T15:00:45+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2022:7647", "initial_release_date": "2022-11-08T09:35:12+00:00", "revision_history": [ { "date": "2022-11-08T09:35:12+00:00", "number": "1", "summary": "Initial version" }, { "date": "2022-11-08T09:35:12+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-15T15:00:45+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux AppStream (v. 8)", "product": { "name": "Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.7.0.GA", "product_identification_helper": { "cpe": "cpe:/a:redhat:enterprise_linux:8::appstream" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "httpd:2.4:8070020220725152258:3b9f49c4", "product": { "name": "httpd:2.4:8070020220725152258:3b9f49c4", "product_id": "httpd:2.4:8070020220725152258:3b9f49c4", "product_identification_helper": { "purl": "pkg:rpmmod/redhat/httpd@2.4:8070020220725152258:3b9f49c4" } } }, { "category": "product_version", "name": "httpd-filesystem-0:2.4.37-51.module+el8.7.0+16050+02173b8e.noarch", "product": { "name": "httpd-filesystem-0:2.4.37-51.module+el8.7.0+16050+02173b8e.noarch", "product_id": "httpd-filesystem-0:2.4.37-51.module+el8.7.0+16050+02173b8e.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-filesystem@2.4.37-51.module%2Bel8.7.0%2B16050%2B02173b8e?arch=noarch" } } }, { "category": "product_version", "name": "httpd-manual-0:2.4.37-51.module+el8.7.0+16050+02173b8e.noarch", "product": { "name": "httpd-manual-0:2.4.37-51.module+el8.7.0+16050+02173b8e.noarch", "product_id": "httpd-manual-0:2.4.37-51.module+el8.7.0+16050+02173b8e.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-manual@2.4.37-51.module%2Bel8.7.0%2B16050%2B02173b8e?arch=noarch" } } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "product": { "name": "httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "product_id": "httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd@2.4.37-51.module%2Bel8.7.0%2B16050%2B02173b8e?arch=aarch64" } } }, { "category": "product_version", "name": "httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "product": { "name": "httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "product_id": "httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-debuginfo@2.4.37-51.module%2Bel8.7.0%2B16050%2B02173b8e?arch=aarch64" } } }, { "category": "product_version", "name": "httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "product": { "name": "httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "product_id": "httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-debugsource@2.4.37-51.module%2Bel8.7.0%2B16050%2B02173b8e?arch=aarch64" } } }, { "category": "product_version", "name": "httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "product": { "name": "httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "product_id": "httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-devel@2.4.37-51.module%2Bel8.7.0%2B16050%2B02173b8e?arch=aarch64" } } }, { "category": "product_version", "name": "httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "product": { "name": "httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "product_id": "httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-tools@2.4.37-51.module%2Bel8.7.0%2B16050%2B02173b8e?arch=aarch64" } } }, { "category": "product_version", "name": "httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "product": { "name": "httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "product_id": "httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-tools-debuginfo@2.4.37-51.module%2Bel8.7.0%2B16050%2B02173b8e?arch=aarch64" } } }, { "category": "product_version", "name": "mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.aarch64", "product": { "name": "mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.aarch64", "product_id": "mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_http2@1.15.7-5.module%2Bel8.6.0%2B13996%2B01710940?arch=aarch64" } } }, { "category": "product_version", "name": "mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.aarch64", "product": { "name": "mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.aarch64", "product_id": "mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_http2-debuginfo@1.15.7-5.module%2Bel8.6.0%2B13996%2B01710940?arch=aarch64" } } }, { "category": "product_version", "name": "mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.aarch64", "product": { "name": "mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.aarch64", "product_id": "mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_http2-debugsource@1.15.7-5.module%2Bel8.6.0%2B13996%2B01710940?arch=aarch64" } } }, { "category": "product_version", "name": "mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "product": { "name": "mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "product_id": "mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ldap@2.4.37-51.module%2Bel8.7.0%2B16050%2B02173b8e?arch=aarch64" } } }, { "category": "product_version", "name": "mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "product": { "name": "mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "product_id": "mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ldap-debuginfo@2.4.37-51.module%2Bel8.7.0%2B16050%2B02173b8e?arch=aarch64" } } }, { "category": "product_version", "name": "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "product": { "name": "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "product_id": "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_md@2.0.8-8.module%2Bel8.3.0%2B6814%2B67d1e611?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "product": { "name": "mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "product_id": "mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_md-debuginfo@2.0.8-8.module%2Bel8.3.0%2B6814%2B67d1e611?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "product": { "name": "mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "product_id": "mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_md-debugsource@2.0.8-8.module%2Bel8.3.0%2B6814%2B67d1e611?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "product": { "name": "mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "product_id": "mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_proxy_html@2.4.37-51.module%2Bel8.7.0%2B16050%2B02173b8e?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "product": { "name": "mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "product_id": "mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_proxy_html-debuginfo@2.4.37-51.module%2Bel8.7.0%2B16050%2B02173b8e?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "product": { "name": "mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "product_id": "mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_session@2.4.37-51.module%2Bel8.7.0%2B16050%2B02173b8e?arch=aarch64" } } }, { "category": "product_version", "name": "mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "product": { "name": "mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "product_id": "mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_session-debuginfo@2.4.37-51.module%2Bel8.7.0%2B16050%2B02173b8e?arch=aarch64" } } }, { "category": "product_version", "name": "mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "product": { "name": "mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "product_id": "mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ssl@2.4.37-51.module%2Bel8.7.0%2B16050%2B02173b8e?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "product": { "name": "mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "product_id": "mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ssl-debuginfo@2.4.37-51.module%2Bel8.7.0%2B16050%2B02173b8e?arch=aarch64\u0026epoch=1" } } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.src", "product": { "name": "httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.src", "product_id": "httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd@2.4.37-51.module%2Bel8.7.0%2B16050%2B02173b8e?arch=src" } } }, { "category": "product_version", "name": "mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.src", "product": { "name": "mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.src", "product_id": "mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_http2@1.15.7-5.module%2Bel8.6.0%2B13996%2B01710940?arch=src" } } }, { "category": "product_version", "name": "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "product": { "name": "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "product_id": "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_md@2.0.8-8.module%2Bel8.3.0%2B6814%2B67d1e611?arch=src\u0026epoch=1" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "product": { "name": "httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "product_id": "httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd@2.4.37-51.module%2Bel8.7.0%2B16050%2B02173b8e?arch=ppc64le" } } }, { "category": "product_version", "name": "httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "product": { "name": "httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "product_id": "httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-debuginfo@2.4.37-51.module%2Bel8.7.0%2B16050%2B02173b8e?arch=ppc64le" } } }, { "category": "product_version", "name": "httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "product": { "name": "httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "product_id": "httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-debugsource@2.4.37-51.module%2Bel8.7.0%2B16050%2B02173b8e?arch=ppc64le" } } }, { "category": "product_version", "name": "httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "product": { "name": "httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "product_id": "httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-devel@2.4.37-51.module%2Bel8.7.0%2B16050%2B02173b8e?arch=ppc64le" } } }, { "category": "product_version", "name": "httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "product": { "name": "httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "product_id": "httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-tools@2.4.37-51.module%2Bel8.7.0%2B16050%2B02173b8e?arch=ppc64le" } } }, { "category": "product_version", "name": "httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "product": { "name": "httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "product_id": "httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-tools-debuginfo@2.4.37-51.module%2Bel8.7.0%2B16050%2B02173b8e?arch=ppc64le" } } }, { "category": "product_version", "name": "mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.ppc64le", "product": { "name": "mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.ppc64le", "product_id": "mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_http2@1.15.7-5.module%2Bel8.6.0%2B13996%2B01710940?arch=ppc64le" } } }, { "category": "product_version", "name": "mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.ppc64le", "product": { "name": "mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.ppc64le", "product_id": "mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_http2-debuginfo@1.15.7-5.module%2Bel8.6.0%2B13996%2B01710940?arch=ppc64le" } } }, { "category": "product_version", "name": "mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.ppc64le", "product": { "name": "mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.ppc64le", "product_id": "mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_http2-debugsource@1.15.7-5.module%2Bel8.6.0%2B13996%2B01710940?arch=ppc64le" } } }, { "category": "product_version", "name": "mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "product": { "name": "mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "product_id": "mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ldap@2.4.37-51.module%2Bel8.7.0%2B16050%2B02173b8e?arch=ppc64le" } } }, { "category": "product_version", "name": "mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "product": { "name": "mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "product_id": "mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ldap-debuginfo@2.4.37-51.module%2Bel8.7.0%2B16050%2B02173b8e?arch=ppc64le" } } }, { "category": "product_version", "name": "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "product": { "name": "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "product_id": "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_md@2.0.8-8.module%2Bel8.3.0%2B6814%2B67d1e611?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "product": { "name": "mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "product_id": "mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_md-debuginfo@2.0.8-8.module%2Bel8.3.0%2B6814%2B67d1e611?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "product": { "name": "mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "product_id": "mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_md-debugsource@2.0.8-8.module%2Bel8.3.0%2B6814%2B67d1e611?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "product": { "name": "mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "product_id": "mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_proxy_html@2.4.37-51.module%2Bel8.7.0%2B16050%2B02173b8e?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "product": { "name": "mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "product_id": "mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_proxy_html-debuginfo@2.4.37-51.module%2Bel8.7.0%2B16050%2B02173b8e?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "product": { "name": "mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "product_id": "mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_session@2.4.37-51.module%2Bel8.7.0%2B16050%2B02173b8e?arch=ppc64le" } } }, { "category": "product_version", "name": "mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "product": { "name": "mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "product_id": "mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_session-debuginfo@2.4.37-51.module%2Bel8.7.0%2B16050%2B02173b8e?arch=ppc64le" } } }, { "category": "product_version", "name": "mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "product": { "name": "mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "product_id": "mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ssl@2.4.37-51.module%2Bel8.7.0%2B16050%2B02173b8e?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "product": { "name": "mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "product_id": "mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ssl-debuginfo@2.4.37-51.module%2Bel8.7.0%2B16050%2B02173b8e?arch=ppc64le\u0026epoch=1" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "product": { "name": "httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "product_id": "httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd@2.4.37-51.module%2Bel8.7.0%2B16050%2B02173b8e?arch=s390x" } } }, { "category": "product_version", "name": "httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "product": { "name": "httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "product_id": "httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-debuginfo@2.4.37-51.module%2Bel8.7.0%2B16050%2B02173b8e?arch=s390x" } } }, { "category": "product_version", "name": "httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "product": { "name": "httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "product_id": "httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-debugsource@2.4.37-51.module%2Bel8.7.0%2B16050%2B02173b8e?arch=s390x" } } }, { "category": "product_version", "name": "httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "product": { "name": "httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "product_id": "httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-devel@2.4.37-51.module%2Bel8.7.0%2B16050%2B02173b8e?arch=s390x" } } }, { "category": "product_version", "name": "httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "product": { "name": "httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "product_id": "httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-tools@2.4.37-51.module%2Bel8.7.0%2B16050%2B02173b8e?arch=s390x" } } }, { "category": "product_version", "name": "httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "product": { "name": "httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "product_id": "httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-tools-debuginfo@2.4.37-51.module%2Bel8.7.0%2B16050%2B02173b8e?arch=s390x" } } }, { "category": "product_version", "name": "mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.s390x", "product": { "name": "mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.s390x", "product_id": "mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_http2@1.15.7-5.module%2Bel8.6.0%2B13996%2B01710940?arch=s390x" } } }, { "category": "product_version", "name": "mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.s390x", "product": { "name": "mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.s390x", "product_id": "mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_http2-debuginfo@1.15.7-5.module%2Bel8.6.0%2B13996%2B01710940?arch=s390x" } } }, { "category": "product_version", "name": "mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.s390x", "product": { "name": "mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.s390x", "product_id": "mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_http2-debugsource@1.15.7-5.module%2Bel8.6.0%2B13996%2B01710940?arch=s390x" } } }, { "category": "product_version", "name": "mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "product": { "name": "mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "product_id": "mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ldap@2.4.37-51.module%2Bel8.7.0%2B16050%2B02173b8e?arch=s390x" } } }, { "category": "product_version", "name": "mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "product": { "name": "mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "product_id": "mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ldap-debuginfo@2.4.37-51.module%2Bel8.7.0%2B16050%2B02173b8e?arch=s390x" } } }, { "category": "product_version", "name": "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "product": { "name": "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "product_id": "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_md@2.0.8-8.module%2Bel8.3.0%2B6814%2B67d1e611?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "product": { "name": "mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "product_id": "mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_md-debuginfo@2.0.8-8.module%2Bel8.3.0%2B6814%2B67d1e611?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "product": { "name": "mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "product_id": "mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_md-debugsource@2.0.8-8.module%2Bel8.3.0%2B6814%2B67d1e611?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "product": { "name": "mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "product_id": "mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_proxy_html@2.4.37-51.module%2Bel8.7.0%2B16050%2B02173b8e?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "product": { "name": "mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "product_id": "mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_proxy_html-debuginfo@2.4.37-51.module%2Bel8.7.0%2B16050%2B02173b8e?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "product": { "name": "mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "product_id": "mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_session@2.4.37-51.module%2Bel8.7.0%2B16050%2B02173b8e?arch=s390x" } } }, { "category": "product_version", "name": "mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "product": { "name": "mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "product_id": "mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_session-debuginfo@2.4.37-51.module%2Bel8.7.0%2B16050%2B02173b8e?arch=s390x" } } }, { "category": "product_version", "name": "mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "product": { "name": "mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "product_id": "mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ssl@2.4.37-51.module%2Bel8.7.0%2B16050%2B02173b8e?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "product": { "name": "mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "product_id": "mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ssl-debuginfo@2.4.37-51.module%2Bel8.7.0%2B16050%2B02173b8e?arch=s390x\u0026epoch=1" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "product": { "name": "httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "product_id": "httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd@2.4.37-51.module%2Bel8.7.0%2B16050%2B02173b8e?arch=x86_64" } } }, { "category": "product_version", "name": "httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "product": { "name": "httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "product_id": "httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-debuginfo@2.4.37-51.module%2Bel8.7.0%2B16050%2B02173b8e?arch=x86_64" } } }, { "category": "product_version", "name": "httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "product": { "name": "httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "product_id": "httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-debugsource@2.4.37-51.module%2Bel8.7.0%2B16050%2B02173b8e?arch=x86_64" } } }, { "category": "product_version", "name": "httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "product": { "name": "httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "product_id": "httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-devel@2.4.37-51.module%2Bel8.7.0%2B16050%2B02173b8e?arch=x86_64" } } }, { "category": "product_version", "name": "httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "product": { "name": "httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "product_id": "httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-tools@2.4.37-51.module%2Bel8.7.0%2B16050%2B02173b8e?arch=x86_64" } } }, { "category": "product_version", "name": "httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "product": { "name": "httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "product_id": "httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-tools-debuginfo@2.4.37-51.module%2Bel8.7.0%2B16050%2B02173b8e?arch=x86_64" } } }, { "category": "product_version", "name": "mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.x86_64", "product": { "name": "mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.x86_64", "product_id": "mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_http2@1.15.7-5.module%2Bel8.6.0%2B13996%2B01710940?arch=x86_64" } } }, { "category": "product_version", "name": "mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.x86_64", "product": { "name": "mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.x86_64", "product_id": "mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_http2-debuginfo@1.15.7-5.module%2Bel8.6.0%2B13996%2B01710940?arch=x86_64" } } }, { "category": "product_version", "name": "mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.x86_64", "product": { "name": "mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.x86_64", "product_id": "mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_http2-debugsource@1.15.7-5.module%2Bel8.6.0%2B13996%2B01710940?arch=x86_64" } } }, { "category": "product_version", "name": "mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "product": { "name": "mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "product_id": "mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ldap@2.4.37-51.module%2Bel8.7.0%2B16050%2B02173b8e?arch=x86_64" } } }, { "category": "product_version", "name": "mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "product": { "name": "mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "product_id": "mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ldap-debuginfo@2.4.37-51.module%2Bel8.7.0%2B16050%2B02173b8e?arch=x86_64" } } }, { "category": "product_version", "name": "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "product": { "name": "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "product_id": "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_md@2.0.8-8.module%2Bel8.3.0%2B6814%2B67d1e611?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "product": { "name": "mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "product_id": "mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_md-debuginfo@2.0.8-8.module%2Bel8.3.0%2B6814%2B67d1e611?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "product": { "name": "mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "product_id": "mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_md-debugsource@2.0.8-8.module%2Bel8.3.0%2B6814%2B67d1e611?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "product": { "name": "mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "product_id": "mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_proxy_html@2.4.37-51.module%2Bel8.7.0%2B16050%2B02173b8e?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "product": { "name": "mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "product_id": "mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_proxy_html-debuginfo@2.4.37-51.module%2Bel8.7.0%2B16050%2B02173b8e?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "product": { "name": "mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "product_id": "mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_session@2.4.37-51.module%2Bel8.7.0%2B16050%2B02173b8e?arch=x86_64" } } }, { "category": "product_version", "name": "mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "product": { "name": "mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "product_id": "mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_session-debuginfo@2.4.37-51.module%2Bel8.7.0%2B16050%2B02173b8e?arch=x86_64" } } }, { "category": "product_version", "name": "mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "product": { "name": "mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "product_id": "mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ssl@2.4.37-51.module%2Bel8.7.0%2B16050%2B02173b8e?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "product": { "name": "mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "product_id": "mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ssl-debuginfo@2.4.37-51.module%2Bel8.7.0%2B16050%2B02173b8e?arch=x86_64\u0026epoch=1" } } } ], "category": "architecture", "name": "x86_64" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "httpd:2.4:8070020220725152258:3b9f49c4 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4" }, "product_reference": "httpd:2.4:8070020220725152258:3b9f49c4", "relates_to_product_reference": "AppStream-8.7.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64 as a component of httpd:2.4:8070020220725152258:3b9f49c4 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64" }, "product_reference": "httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "relates_to_product_reference": "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le as a component of httpd:2.4:8070020220725152258:3b9f49c4 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le" }, "product_reference": "httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "relates_to_product_reference": "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x as a component of httpd:2.4:8070020220725152258:3b9f49c4 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x" }, "product_reference": "httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "relates_to_product_reference": "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.src as a component of httpd:2.4:8070020220725152258:3b9f49c4 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.src" }, "product_reference": "httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.src", "relates_to_product_reference": "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64 as a component of httpd:2.4:8070020220725152258:3b9f49c4 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64" }, "product_reference": "httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "relates_to_product_reference": "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64 as a component of httpd:2.4:8070020220725152258:3b9f49c4 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64" }, "product_reference": "httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "relates_to_product_reference": "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le as a component of httpd:2.4:8070020220725152258:3b9f49c4 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le" }, "product_reference": "httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "relates_to_product_reference": "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x as a component of httpd:2.4:8070020220725152258:3b9f49c4 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x" }, "product_reference": "httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "relates_to_product_reference": "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64 as a component of httpd:2.4:8070020220725152258:3b9f49c4 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64" }, "product_reference": "httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "relates_to_product_reference": "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64 as a component of httpd:2.4:8070020220725152258:3b9f49c4 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64" }, "product_reference": "httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "relates_to_product_reference": "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le as a component of httpd:2.4:8070020220725152258:3b9f49c4 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le" }, "product_reference": "httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "relates_to_product_reference": "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x as a component of httpd:2.4:8070020220725152258:3b9f49c4 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x" }, "product_reference": "httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "relates_to_product_reference": "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64 as a component of httpd:2.4:8070020220725152258:3b9f49c4 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64" }, "product_reference": "httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "relates_to_product_reference": "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64 as a component of httpd:2.4:8070020220725152258:3b9f49c4 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64" }, "product_reference": "httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "relates_to_product_reference": "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le as a component of httpd:2.4:8070020220725152258:3b9f49c4 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le" }, "product_reference": "httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "relates_to_product_reference": "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x as a component of httpd:2.4:8070020220725152258:3b9f49c4 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x" }, "product_reference": "httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "relates_to_product_reference": "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64 as a component of httpd:2.4:8070020220725152258:3b9f49c4 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64" }, "product_reference": "httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "relates_to_product_reference": "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-filesystem-0:2.4.37-51.module+el8.7.0+16050+02173b8e.noarch as a component of httpd:2.4:8070020220725152258:3b9f49c4 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-filesystem-0:2.4.37-51.module+el8.7.0+16050+02173b8e.noarch" }, "product_reference": "httpd-filesystem-0:2.4.37-51.module+el8.7.0+16050+02173b8e.noarch", "relates_to_product_reference": "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-manual-0:2.4.37-51.module+el8.7.0+16050+02173b8e.noarch as a component of httpd:2.4:8070020220725152258:3b9f49c4 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-manual-0:2.4.37-51.module+el8.7.0+16050+02173b8e.noarch" }, "product_reference": "httpd-manual-0:2.4.37-51.module+el8.7.0+16050+02173b8e.noarch", "relates_to_product_reference": "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64 as a component of httpd:2.4:8070020220725152258:3b9f49c4 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64" }, "product_reference": "httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "relates_to_product_reference": "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le as a component of httpd:2.4:8070020220725152258:3b9f49c4 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le" }, "product_reference": "httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "relates_to_product_reference": "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x as a component of httpd:2.4:8070020220725152258:3b9f49c4 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x" }, "product_reference": "httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "relates_to_product_reference": "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64 as a component of httpd:2.4:8070020220725152258:3b9f49c4 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64" }, "product_reference": "httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "relates_to_product_reference": "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64 as a component of httpd:2.4:8070020220725152258:3b9f49c4 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64" }, "product_reference": "httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "relates_to_product_reference": "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le as a component of httpd:2.4:8070020220725152258:3b9f49c4 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le" }, "product_reference": "httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "relates_to_product_reference": "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x as a component of httpd:2.4:8070020220725152258:3b9f49c4 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x" }, "product_reference": "httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "relates_to_product_reference": "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64 as a component of httpd:2.4:8070020220725152258:3b9f49c4 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64" }, "product_reference": "httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "relates_to_product_reference": "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4" }, { "category": "default_component_of", "full_product_name": { "name": "mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.aarch64 as a component of httpd:2.4:8070020220725152258:3b9f49c4 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.aarch64" }, "product_reference": "mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.aarch64", "relates_to_product_reference": "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4" }, { "category": "default_component_of", "full_product_name": { "name": "mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.ppc64le as a component of httpd:2.4:8070020220725152258:3b9f49c4 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.ppc64le" }, "product_reference": "mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.ppc64le", "relates_to_product_reference": "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4" }, { "category": "default_component_of", "full_product_name": { "name": "mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.s390x as a component of httpd:2.4:8070020220725152258:3b9f49c4 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.s390x" }, "product_reference": "mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.s390x", "relates_to_product_reference": "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4" }, { "category": "default_component_of", "full_product_name": { "name": "mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.src as a component of httpd:2.4:8070020220725152258:3b9f49c4 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.src" }, "product_reference": "mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.src", "relates_to_product_reference": "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4" }, { "category": "default_component_of", "full_product_name": { "name": "mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.x86_64 as a component of httpd:2.4:8070020220725152258:3b9f49c4 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.x86_64" }, "product_reference": "mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.x86_64", "relates_to_product_reference": "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4" }, { "category": "default_component_of", "full_product_name": { "name": "mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.aarch64 as a component of httpd:2.4:8070020220725152258:3b9f49c4 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.aarch64" }, "product_reference": "mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.aarch64", "relates_to_product_reference": "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4" }, { "category": "default_component_of", "full_product_name": { "name": "mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.ppc64le as a component of httpd:2.4:8070020220725152258:3b9f49c4 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.ppc64le" }, "product_reference": "mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.ppc64le", "relates_to_product_reference": "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4" }, { "category": "default_component_of", "full_product_name": { "name": "mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.s390x as a component of httpd:2.4:8070020220725152258:3b9f49c4 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.s390x" }, "product_reference": "mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.s390x", "relates_to_product_reference": "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4" }, { "category": "default_component_of", "full_product_name": { "name": "mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.x86_64 as a component of httpd:2.4:8070020220725152258:3b9f49c4 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.x86_64" }, "product_reference": "mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.x86_64", "relates_to_product_reference": "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4" }, { "category": "default_component_of", "full_product_name": { "name": "mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.aarch64 as a component of httpd:2.4:8070020220725152258:3b9f49c4 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.aarch64" }, "product_reference": "mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.aarch64", "relates_to_product_reference": "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4" }, { "category": "default_component_of", "full_product_name": { "name": "mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.ppc64le as a component of httpd:2.4:8070020220725152258:3b9f49c4 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.ppc64le" }, "product_reference": "mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.ppc64le", "relates_to_product_reference": "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4" }, { "category": "default_component_of", "full_product_name": { "name": "mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.s390x as a component of httpd:2.4:8070020220725152258:3b9f49c4 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.s390x" }, "product_reference": "mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.s390x", "relates_to_product_reference": "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4" }, { "category": "default_component_of", "full_product_name": { "name": "mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.x86_64 as a component of httpd:2.4:8070020220725152258:3b9f49c4 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.x86_64" }, "product_reference": "mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.x86_64", "relates_to_product_reference": "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64 as a component of httpd:2.4:8070020220725152258:3b9f49c4 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64" }, "product_reference": "mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "relates_to_product_reference": "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le as a component of httpd:2.4:8070020220725152258:3b9f49c4 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le" }, "product_reference": "mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "relates_to_product_reference": "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x as a component of httpd:2.4:8070020220725152258:3b9f49c4 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x" }, "product_reference": "mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "relates_to_product_reference": "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64 as a component of httpd:2.4:8070020220725152258:3b9f49c4 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64" }, "product_reference": "mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "relates_to_product_reference": "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64 as a component of httpd:2.4:8070020220725152258:3b9f49c4 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64" }, "product_reference": "mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "relates_to_product_reference": "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le as a component of httpd:2.4:8070020220725152258:3b9f49c4 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le" }, "product_reference": "mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "relates_to_product_reference": "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x as a component of httpd:2.4:8070020220725152258:3b9f49c4 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x" }, "product_reference": "mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "relates_to_product_reference": "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64 as a component of httpd:2.4:8070020220725152258:3b9f49c4 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64" }, "product_reference": "mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "relates_to_product_reference": "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4" }, { "category": "default_component_of", "full_product_name": { "name": "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64 as a component of httpd:2.4:8070020220725152258:3b9f49c4 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64" }, "product_reference": "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "relates_to_product_reference": "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4" }, { "category": "default_component_of", "full_product_name": { "name": "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le as a component of httpd:2.4:8070020220725152258:3b9f49c4 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le" }, "product_reference": "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "relates_to_product_reference": "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4" }, { "category": "default_component_of", "full_product_name": { "name": "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x as a component of httpd:2.4:8070020220725152258:3b9f49c4 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x" }, "product_reference": "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "relates_to_product_reference": "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4" }, { "category": "default_component_of", "full_product_name": { "name": "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src as a component of httpd:2.4:8070020220725152258:3b9f49c4 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src" }, "product_reference": "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "relates_to_product_reference": "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4" }, { "category": "default_component_of", "full_product_name": { "name": "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64 as a component of httpd:2.4:8070020220725152258:3b9f49c4 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64" }, "product_reference": "mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "relates_to_product_reference": "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4" }, { "category": "default_component_of", "full_product_name": { "name": "mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64 as a component of httpd:2.4:8070020220725152258:3b9f49c4 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64" }, "product_reference": "mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "relates_to_product_reference": "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4" }, { "category": "default_component_of", "full_product_name": { "name": "mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le as a component of httpd:2.4:8070020220725152258:3b9f49c4 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le" }, "product_reference": "mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "relates_to_product_reference": "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4" }, { "category": "default_component_of", "full_product_name": { "name": "mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x as a component of httpd:2.4:8070020220725152258:3b9f49c4 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x" }, "product_reference": "mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "relates_to_product_reference": "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4" }, { "category": "default_component_of", "full_product_name": { "name": "mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64 as a component of httpd:2.4:8070020220725152258:3b9f49c4 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64" }, "product_reference": "mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "relates_to_product_reference": "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4" }, { "category": "default_component_of", "full_product_name": { "name": "mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64 as a component of httpd:2.4:8070020220725152258:3b9f49c4 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64" }, "product_reference": "mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "relates_to_product_reference": "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4" }, { "category": "default_component_of", "full_product_name": { "name": "mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le as a component of httpd:2.4:8070020220725152258:3b9f49c4 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le" }, "product_reference": "mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "relates_to_product_reference": "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4" }, { "category": "default_component_of", "full_product_name": { "name": "mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x as a component of httpd:2.4:8070020220725152258:3b9f49c4 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x" }, "product_reference": "mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "relates_to_product_reference": "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4" }, { "category": "default_component_of", "full_product_name": { "name": "mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64 as a component of httpd:2.4:8070020220725152258:3b9f49c4 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64" }, "product_reference": "mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "relates_to_product_reference": "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64 as a component of httpd:2.4:8070020220725152258:3b9f49c4 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64" }, "product_reference": "mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "relates_to_product_reference": "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le as a component of httpd:2.4:8070020220725152258:3b9f49c4 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le" }, "product_reference": "mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "relates_to_product_reference": "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x as a component of httpd:2.4:8070020220725152258:3b9f49c4 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x" }, "product_reference": "mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "relates_to_product_reference": "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64 as a component of httpd:2.4:8070020220725152258:3b9f49c4 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64" }, "product_reference": "mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "relates_to_product_reference": "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64 as a component of httpd:2.4:8070020220725152258:3b9f49c4 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64" }, "product_reference": "mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "relates_to_product_reference": "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le as a component of httpd:2.4:8070020220725152258:3b9f49c4 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le" }, "product_reference": "mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "relates_to_product_reference": "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x as a component of httpd:2.4:8070020220725152258:3b9f49c4 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x" }, "product_reference": "mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "relates_to_product_reference": "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64 as a component of httpd:2.4:8070020220725152258:3b9f49c4 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64" }, "product_reference": "mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "relates_to_product_reference": "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64 as a component of httpd:2.4:8070020220725152258:3b9f49c4 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64" }, "product_reference": "mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "relates_to_product_reference": "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le as a component of httpd:2.4:8070020220725152258:3b9f49c4 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le" }, "product_reference": "mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "relates_to_product_reference": "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x as a component of httpd:2.4:8070020220725152258:3b9f49c4 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x" }, "product_reference": "mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "relates_to_product_reference": "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64 as a component of httpd:2.4:8070020220725152258:3b9f49c4 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64" }, "product_reference": "mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "relates_to_product_reference": "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64 as a component of httpd:2.4:8070020220725152258:3b9f49c4 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64" }, "product_reference": "mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "relates_to_product_reference": "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le as a component of httpd:2.4:8070020220725152258:3b9f49c4 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le" }, "product_reference": "mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "relates_to_product_reference": "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x as a component of httpd:2.4:8070020220725152258:3b9f49c4 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x" }, "product_reference": "mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "relates_to_product_reference": "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64 as a component of httpd:2.4:8070020220725152258:3b9f49c4 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64" }, "product_reference": "mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "relates_to_product_reference": "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64 as a component of httpd:2.4:8070020220725152258:3b9f49c4 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64" }, "product_reference": "mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "relates_to_product_reference": "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le as a component of httpd:2.4:8070020220725152258:3b9f49c4 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le" }, "product_reference": "mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "relates_to_product_reference": "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x as a component of httpd:2.4:8070020220725152258:3b9f49c4 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x" }, "product_reference": "mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "relates_to_product_reference": "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64 as a component of httpd:2.4:8070020220725152258:3b9f49c4 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64" }, "product_reference": "mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "relates_to_product_reference": "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64 as a component of httpd:2.4:8070020220725152258:3b9f49c4 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64" }, "product_reference": "mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "relates_to_product_reference": "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le as a component of httpd:2.4:8070020220725152258:3b9f49c4 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le" }, "product_reference": "mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "relates_to_product_reference": "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x as a component of httpd:2.4:8070020220725152258:3b9f49c4 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x" }, "product_reference": "mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "relates_to_product_reference": "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64 as a component of httpd:2.4:8070020220725152258:3b9f49c4 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64" }, "product_reference": "mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "relates_to_product_reference": "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4" } ] }, "vulnerabilities": [ { "cve": "CVE-2022-22719", "cwe": { "id": "CWE-908", "name": "Use of Uninitialized Resource" }, "discovery_date": "2022-03-15T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2064322" } ], "notes": [ { "category": "description", "text": "A flaw was found in the mod_lua module of httpd. A crafted request body can cause a read to a random memory area due to an uninitialized value in functions called by the parsebody function. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "httpd: mod_lua: Use of uninitialized value of in r:parsebody", "title": "Vulnerability summary" }, { "category": "other", "text": "httpd as shipped with Red Hat Enterprise Linux 6, is not affected by this flaw because it does not ship mod_lua.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.src", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-filesystem-0:2.4.37-51.module+el8.7.0+16050+02173b8e.noarch", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-manual-0:2.4.37-51.module+el8.7.0+16050+02173b8e.noarch", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.src", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-22719" }, { "category": "external", "summary": "RHBZ#2064322", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2064322" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-22719", "url": "https://www.cve.org/CVERecord?id=CVE-2022-22719" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-22719", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-22719" }, { "category": "external", "summary": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2022-22719", "url": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2022-22719" } ], "release_date": "2022-03-14T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-11-08T09:35:12+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically.", "product_ids": [ "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.src", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-filesystem-0:2.4.37-51.module+el8.7.0+16050+02173b8e.noarch", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-manual-0:2.4.37-51.module+el8.7.0+16050+02173b8e.noarch", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.src", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:7647" }, { "category": "workaround", "details": "Disabling mod_lua and restarting httpd will mitigate this flaw. See https://access.redhat.com/articles/10649 for more information.", "product_ids": [ "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.src", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-filesystem-0:2.4.37-51.module+el8.7.0+16050+02173b8e.noarch", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-manual-0:2.4.37-51.module+el8.7.0+16050+02173b8e.noarch", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.src", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.src", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-filesystem-0:2.4.37-51.module+el8.7.0+16050+02173b8e.noarch", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-manual-0:2.4.37-51.module+el8.7.0+16050+02173b8e.noarch", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.src", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "httpd: mod_lua: Use of uninitialized value of in r:parsebody" }, { "cve": "CVE-2022-22721", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "discovery_date": "2022-03-15T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2064320" } ], "notes": [ { "category": "description", "text": "A flaw was found in httpd, where it incorrectly limits the value of the LimitXMLRequestBody option. This issue can lead to an integer overflow and later causes an out-of-bounds write.", "title": "Vulnerability description" }, { "category": "summary", "text": "httpd: core: Possible buffer overflow with very large or unlimited LimitXMLRequestBody", "title": "Vulnerability summary" }, { "category": "other", "text": "The default configuration of the LimitXMLRequestBody option on RHEL is 1MB and therefore is not vulnerable to this flaw. Also, this issue is known to only affect 32bit httpd builds.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.src", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-filesystem-0:2.4.37-51.module+el8.7.0+16050+02173b8e.noarch", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-manual-0:2.4.37-51.module+el8.7.0+16050+02173b8e.noarch", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.src", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-22721" }, { "category": "external", "summary": "RHBZ#2064320", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2064320" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-22721", "url": "https://www.cve.org/CVERecord?id=CVE-2022-22721" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-22721", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-22721" }, { "category": "external", "summary": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2022-22721", "url": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2022-22721" } ], "release_date": "2022-03-14T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-11-08T09:35:12+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically.", "product_ids": [ "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.src", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-filesystem-0:2.4.37-51.module+el8.7.0+16050+02173b8e.noarch", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-manual-0:2.4.37-51.module+el8.7.0+16050+02173b8e.noarch", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.src", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:7647" }, { "category": "workaround", "details": "Set the LimitXMLRequestBody option to a value smaller than 350MB. Setting it to 0 is not recommended as it will use a hard limit (depending on 32bit or 64bit systems) which may result in an overall system out-of-memory. The default configuration is not vulnerable to this flaw, see the statement above.", "product_ids": [ "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.src", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-filesystem-0:2.4.37-51.module+el8.7.0+16050+02173b8e.noarch", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-manual-0:2.4.37-51.module+el8.7.0+16050+02173b8e.noarch", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.src", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.4, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:H", "version": "3.1" }, "products": [ "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.src", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-filesystem-0:2.4.37-51.module+el8.7.0+16050+02173b8e.noarch", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-manual-0:2.4.37-51.module+el8.7.0+16050+02173b8e.noarch", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.src", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "httpd: core: Possible buffer overflow with very large or unlimited LimitXMLRequestBody" }, { "cve": "CVE-2022-23943", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "discovery_date": "2022-03-15T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2064319" } ], "notes": [ { "category": "description", "text": "An out-of-bounds read/write vulnerability was found in the mod_sed module of httpd. This flaw allows an attacker to overwrite the memory of an httpd instance that is using mod_sed with data provided by the attacker.", "title": "Vulnerability description" }, { "category": "summary", "text": "httpd: mod_sed: Read/write beyond bounds", "title": "Vulnerability summary" }, { "category": "other", "text": "The `mod_sed` module is disabled by default on Red Hat Enterprise Linux 7 and 8. For this reason, the flaw has been rated as having a security impact of Moderate. The httpd package as shipped with Red Hat Enterprise Linux 6 is not affected by this flaw because the `mod_sed` module is available only in httpd 2.3 and later.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.src", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-filesystem-0:2.4.37-51.module+el8.7.0+16050+02173b8e.noarch", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-manual-0:2.4.37-51.module+el8.7.0+16050+02173b8e.noarch", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.src", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-23943" }, { "category": "external", "summary": "RHBZ#2064319", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2064319" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-23943", "url": "https://www.cve.org/CVERecord?id=CVE-2022-23943" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-23943", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-23943" }, { "category": "external", "summary": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2022-23943", "url": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2022-23943" } ], "release_date": "2022-03-14T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-11-08T09:35:12+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically.", "product_ids": [ "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.src", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-filesystem-0:2.4.37-51.module+el8.7.0+16050+02173b8e.noarch", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-manual-0:2.4.37-51.module+el8.7.0+16050+02173b8e.noarch", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.src", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:7647" }, { "category": "workaround", "details": "Disabling mod_sed and restarting httpd will mitigate this flaw. See https://access.redhat.com/articles/10649 for more information.", "product_ids": [ "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.src", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-filesystem-0:2.4.37-51.module+el8.7.0+16050+02173b8e.noarch", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-manual-0:2.4.37-51.module+el8.7.0+16050+02173b8e.noarch", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.src", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.src", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-filesystem-0:2.4.37-51.module+el8.7.0+16050+02173b8e.noarch", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-manual-0:2.4.37-51.module+el8.7.0+16050+02173b8e.noarch", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.src", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "httpd: mod_sed: Read/write beyond bounds" }, { "cve": "CVE-2022-26377", "cwe": { "id": "CWE-444", "name": "Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027)" }, "discovery_date": "2022-06-08T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2094997" } ], "notes": [ { "category": "description", "text": "An HTTP request smuggling vulnerability was found in the mod_proxy_ajp module of httpd. This flaw allows an attacker to smuggle requests to the AJP server, where it forwards requests.", "title": "Vulnerability description" }, { "category": "summary", "text": "httpd: mod_proxy_ajp: Possible request smuggling", "title": "Vulnerability summary" }, { "category": "other", "text": "The httpd mod_proxy_ajp module is enabled by default on Red Hat Enterprise Linux 8, 9, and in RHSCL. However, there are no directives forwarding requests using the AJP protocol.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.src", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-filesystem-0:2.4.37-51.module+el8.7.0+16050+02173b8e.noarch", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-manual-0:2.4.37-51.module+el8.7.0+16050+02173b8e.noarch", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.src", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-26377" }, { "category": "external", "summary": "RHBZ#2094997", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2094997" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-26377", "url": "https://www.cve.org/CVERecord?id=CVE-2022-26377" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-26377", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-26377" }, { "category": "external", "summary": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2022-26377", "url": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2022-26377" } ], "release_date": "2022-06-08T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-11-08T09:35:12+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically.", "product_ids": [ "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.src", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-filesystem-0:2.4.37-51.module+el8.7.0+16050+02173b8e.noarch", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-manual-0:2.4.37-51.module+el8.7.0+16050+02173b8e.noarch", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.src", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:7647" }, { "category": "workaround", "details": "Disabling mod_proxy_ajp and restarting httpd will mitigate this flaw.", "product_ids": [ "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.src", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-filesystem-0:2.4.37-51.module+el8.7.0+16050+02173b8e.noarch", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-manual-0:2.4.37-51.module+el8.7.0+16050+02173b8e.noarch", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.src", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:L", "version": "3.1" }, "products": [ "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.src", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-filesystem-0:2.4.37-51.module+el8.7.0+16050+02173b8e.noarch", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-manual-0:2.4.37-51.module+el8.7.0+16050+02173b8e.noarch", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.src", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "httpd: mod_proxy_ajp: Possible request smuggling" }, { "cve": "CVE-2022-28614", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2022-06-08T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2095002" } ], "notes": [ { "category": "description", "text": "An out-of-bounds read vulnerability was found in httpd. A very large input to the ap_rputs and ap_rwrite functions can lead to an integer overflow and result in an out-of-bounds read.", "title": "Vulnerability description" }, { "category": "summary", "text": "httpd: Out-of-bounds read via ap_rwrite()", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.src", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-filesystem-0:2.4.37-51.module+el8.7.0+16050+02173b8e.noarch", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-manual-0:2.4.37-51.module+el8.7.0+16050+02173b8e.noarch", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.src", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-28614" }, { "category": "external", "summary": "RHBZ#2095002", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2095002" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-28614", "url": "https://www.cve.org/CVERecord?id=CVE-2022-28614" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-28614", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-28614" }, { "category": "external", "summary": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2022-28614", "url": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2022-28614" } ], "release_date": "2022-06-08T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-11-08T09:35:12+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically.", "product_ids": [ "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.src", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-filesystem-0:2.4.37-51.module+el8.7.0+16050+02173b8e.noarch", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-manual-0:2.4.37-51.module+el8.7.0+16050+02173b8e.noarch", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.src", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:7647" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.src", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-filesystem-0:2.4.37-51.module+el8.7.0+16050+02173b8e.noarch", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-manual-0:2.4.37-51.module+el8.7.0+16050+02173b8e.noarch", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.src", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "httpd: Out-of-bounds read via ap_rwrite()" }, { "cve": "CVE-2022-28615", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "discovery_date": "2022-06-08T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2095006" } ], "notes": [ { "category": "description", "text": "An out-of-bounds read vulnerability was found in httpd. A very large input to the ap_strcmp_match function can lead to an integer overflow and result in an out-of-bounds read.", "title": "Vulnerability description" }, { "category": "summary", "text": "httpd: Out-of-bounds read in ap_strcmp_match()", "title": "Vulnerability summary" }, { "category": "other", "text": "According to upstream, no code distributed with the httpd server can exploit this flaw, however, third-party modules or Lua scripts that use the ap_strcmp_match function could potentially be affected.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.src", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-filesystem-0:2.4.37-51.module+el8.7.0+16050+02173b8e.noarch", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-manual-0:2.4.37-51.module+el8.7.0+16050+02173b8e.noarch", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.src", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-28615" }, { "category": "external", "summary": "RHBZ#2095006", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2095006" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-28615", "url": "https://www.cve.org/CVERecord?id=CVE-2022-28615" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-28615", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-28615" }, { "category": "external", "summary": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2022-28615", "url": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2022-28615" } ], "release_date": "2022-06-08T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-11-08T09:35:12+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically.", "product_ids": [ "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.src", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-filesystem-0:2.4.37-51.module+el8.7.0+16050+02173b8e.noarch", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-manual-0:2.4.37-51.module+el8.7.0+16050+02173b8e.noarch", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.src", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:7647" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.4, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H", "version": "3.1" }, "products": [ "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.src", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-filesystem-0:2.4.37-51.module+el8.7.0+16050+02173b8e.noarch", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-manual-0:2.4.37-51.module+el8.7.0+16050+02173b8e.noarch", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.src", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "httpd: Out-of-bounds read in ap_strcmp_match()" }, { "cve": "CVE-2022-29404", "cwe": { "id": "CWE-770", "name": "Allocation of Resources Without Limits or Throttling" }, "discovery_date": "2022-06-08T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2095012" } ], "notes": [ { "category": "description", "text": "A flaw was found in the mod_lua module of httpd. A malicious request to a Lua script that calls parsebody(0) can lead to a denial of service due to no default limit on the possible input size.", "title": "Vulnerability description" }, { "category": "summary", "text": "httpd: mod_lua: DoS in r:parsebody", "title": "Vulnerability summary" }, { "category": "other", "text": "httpd as shipped with Red Hat Enterprise Linux 6, is not affected by this flaw because it does not ship mod_lua.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.src", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-filesystem-0:2.4.37-51.module+el8.7.0+16050+02173b8e.noarch", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-manual-0:2.4.37-51.module+el8.7.0+16050+02173b8e.noarch", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.src", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-29404" }, { "category": "external", "summary": "RHBZ#2095012", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2095012" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-29404", "url": "https://www.cve.org/CVERecord?id=CVE-2022-29404" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-29404", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-29404" }, { "category": "external", "summary": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2022-29404", "url": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2022-29404" } ], "release_date": "2022-06-08T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-11-08T09:35:12+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically.", "product_ids": [ "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.src", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-filesystem-0:2.4.37-51.module+el8.7.0+16050+02173b8e.noarch", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-manual-0:2.4.37-51.module+el8.7.0+16050+02173b8e.noarch", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.src", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:7647" }, { "category": "workaround", "details": "Disabling mod_lua and restarting httpd will mitigate this flaw.", "product_ids": [ "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.src", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-filesystem-0:2.4.37-51.module+el8.7.0+16050+02173b8e.noarch", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-manual-0:2.4.37-51.module+el8.7.0+16050+02173b8e.noarch", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.src", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.src", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-filesystem-0:2.4.37-51.module+el8.7.0+16050+02173b8e.noarch", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-manual-0:2.4.37-51.module+el8.7.0+16050+02173b8e.noarch", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.src", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "httpd: mod_lua: DoS in r:parsebody" }, { "cve": "CVE-2022-30522", "cwe": { "id": "CWE-789", "name": "Memory Allocation with Excessive Size Value" }, "discovery_date": "2022-06-08T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2095015" } ], "notes": [ { "category": "description", "text": "A flaw was found in the mod_sed module of httpd. A very large input to the mod_sed module can result in a denial of service due to excessively large memory allocations.", "title": "Vulnerability description" }, { "category": "summary", "text": "httpd: mod_sed: DoS vulnerability", "title": "Vulnerability summary" }, { "category": "other", "text": "The mod_sed module is disabled by default on Red Hat Enterprise Linux 7 and 8. The httpd package as shipped with Red Hat Enterprise Linux 6 is not affected by this flaw because the mod_sed module is not available.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.src", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-filesystem-0:2.4.37-51.module+el8.7.0+16050+02173b8e.noarch", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-manual-0:2.4.37-51.module+el8.7.0+16050+02173b8e.noarch", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.src", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-30522" }, { "category": "external", "summary": "RHBZ#2095015", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2095015" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-30522", "url": "https://www.cve.org/CVERecord?id=CVE-2022-30522" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-30522", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-30522" }, { "category": "external", "summary": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2022-30522", "url": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2022-30522" } ], "release_date": "2022-06-08T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-11-08T09:35:12+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically.", "product_ids": [ "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.src", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-filesystem-0:2.4.37-51.module+el8.7.0+16050+02173b8e.noarch", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-manual-0:2.4.37-51.module+el8.7.0+16050+02173b8e.noarch", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.src", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:7647" }, { "category": "workaround", "details": "Disabling mod_sed and restating httpd will mitigate this flaw.", "product_ids": [ "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.src", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-filesystem-0:2.4.37-51.module+el8.7.0+16050+02173b8e.noarch", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-manual-0:2.4.37-51.module+el8.7.0+16050+02173b8e.noarch", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.src", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.src", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-filesystem-0:2.4.37-51.module+el8.7.0+16050+02173b8e.noarch", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-manual-0:2.4.37-51.module+el8.7.0+16050+02173b8e.noarch", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.src", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "httpd: mod_sed: DoS vulnerability" }, { "cve": "CVE-2022-30556", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2022-06-08T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2095018" } ], "notes": [ { "category": "description", "text": "A flaw was found in the mod_lua module of httpd. The data returned by the wsread function may point past the end of the storage allocated for the buffer, resulting in information disclosure.", "title": "Vulnerability description" }, { "category": "summary", "text": "httpd: mod_lua: Information disclosure with websockets", "title": "Vulnerability summary" }, { "category": "other", "text": "httpd as shipped with Red Hat Enterprise Linux 6, is not affected by this flaw because it does not ship mod_lua. Red Hat Enterprise Linux 7 is not affected by this flaw because the wsread function is not available.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.src", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-filesystem-0:2.4.37-51.module+el8.7.0+16050+02173b8e.noarch", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-manual-0:2.4.37-51.module+el8.7.0+16050+02173b8e.noarch", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.src", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-30556" }, { "category": "external", "summary": "RHBZ#2095018", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2095018" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-30556", "url": "https://www.cve.org/CVERecord?id=CVE-2022-30556" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-30556", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-30556" }, { "category": "external", "summary": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2022-30556", "url": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2022-30556" } ], "release_date": "2022-06-08T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-11-08T09:35:12+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically.", "product_ids": [ "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.src", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-filesystem-0:2.4.37-51.module+el8.7.0+16050+02173b8e.noarch", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-manual-0:2.4.37-51.module+el8.7.0+16050+02173b8e.noarch", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.src", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:7647" }, { "category": "workaround", "details": "Disabling mod_lua and restarting httpd will mitigate this flaw.", "product_ids": [ "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.src", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-filesystem-0:2.4.37-51.module+el8.7.0+16050+02173b8e.noarch", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-manual-0:2.4.37-51.module+el8.7.0+16050+02173b8e.noarch", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.src", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.src", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-filesystem-0:2.4.37-51.module+el8.7.0+16050+02173b8e.noarch", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-manual-0:2.4.37-51.module+el8.7.0+16050+02173b8e.noarch", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.src", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "httpd: mod_lua: Information disclosure with websockets" }, { "cve": "CVE-2022-31813", "cwe": { "id": "CWE-348", "name": "Use of Less Trusted Source" }, "discovery_date": "2022-06-08T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2095020" } ], "notes": [ { "category": "description", "text": "A flaw was found in the mod_proxy module of httpd. The server may remove the X-Forwarded-* headers from a request based on the client-side Connection header hop-by-hop mechanism.", "title": "Vulnerability description" }, { "category": "summary", "text": "httpd: mod_proxy: X-Forwarded-For dropped by hop-by-hop mechanism", "title": "Vulnerability summary" }, { "category": "other", "text": "This flaw has been rated as having a security impact of Moderate, and is not currently planned to be addressed in future updates of Red Hat Enterprise Linux 7. Red Hat Enterprise Linux 7 is now in Maintenance Support 2 Phase of the support and maintenance life cycle. For additional information, refer to the Red Hat Enterprise Linux Life Cycle: https://access.redhat.com/support/policy/updates/errata.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.src", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-filesystem-0:2.4.37-51.module+el8.7.0+16050+02173b8e.noarch", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-manual-0:2.4.37-51.module+el8.7.0+16050+02173b8e.noarch", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.src", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-31813" }, { "category": "external", "summary": "RHBZ#2095020", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2095020" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-31813", "url": "https://www.cve.org/CVERecord?id=CVE-2022-31813" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-31813", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-31813" }, { "category": "external", "summary": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2022-31813", "url": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2022-31813" } ], "release_date": "2022-06-08T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-11-08T09:35:12+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically.", "product_ids": [ "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.src", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-filesystem-0:2.4.37-51.module+el8.7.0+16050+02173b8e.noarch", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-manual-0:2.4.37-51.module+el8.7.0+16050+02173b8e.noarch", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.src", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:7647" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.src", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-filesystem-0:2.4.37-51.module+el8.7.0+16050+02173b8e.noarch", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-manual-0:2.4.37-51.module+el8.7.0+16050+02173b8e.noarch", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.src", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 7.3, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" }, "products": [ "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.src", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-debugsource-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-devel-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-filesystem-0:2.4.37-51.module+el8.7.0+16050+02173b8e.noarch", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-manual-0:2.4.37-51.module+el8.7.0+16050+02173b8e.noarch", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:httpd-tools-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.src", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-0:1.15.7-5.module+el8.6.0+13996+01710940.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debuginfo-0:1.15.7-5.module+el8.6.0+13996+01710940.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_http2-debugsource-0:1.15.7-5.module+el8.6.0+13996+01710940.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ldap-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.src", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debuginfo-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_md-debugsource-1:2.0.8-8.module+el8.3.0+6814+67d1e611.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_proxy_html-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_session-debuginfo-0:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.aarch64", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.ppc64le", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.s390x", "AppStream-8.7.0.GA:httpd:2.4:8070020220725152258:3b9f49c4:mod_ssl-debuginfo-1:2.4.37-51.module+el8.7.0+16050+02173b8e.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "httpd: mod_proxy: X-Forwarded-For dropped by hop-by-hop mechanism" } ] }
wid-sec-w-2023-1969
Vulnerability from csaf_certbund
Published
2023-08-06 22:00
Modified
2023-08-06 22:00
Summary
HPE Fabric OS: Mehrere Schwachstellen ermöglichen Privilegieneskalation
Notes
Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.
Produktbeschreibung
Fabric OS (FOS) ist ein Betriebssystem für FibreChannel Switches.
Angriff
Ein entfernter, anonymer Angreifer kann mehrere Schwachstellen in HPE Fabric OS für HPE Fibre Channel und SAN Switches ausnutzen, um seine Privilegien zu erhöhen, Informationen offenzulegen oder einen Denial of Service Zustand herbeizuführen.
Betroffene Betriebssysteme
- BIOS/Firmware
- Hardware Appliance
{ "document": { "aggregate_severity": { "text": "hoch" }, "category": "csaf_base", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "de-DE", "notes": [ { "category": "legal_disclaimer", "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen." }, { "category": "description", "text": "Fabric OS (FOS) ist ein Betriebssystem f\u00fcr FibreChannel Switches.", "title": "Produktbeschreibung" }, { "category": "summary", "text": "Ein entfernter, anonymer Angreifer kann mehrere Schwachstellen in HPE Fabric OS f\u00fcr HPE Fibre Channel und SAN Switches ausnutzen, um seine Privilegien zu erh\u00f6hen, Informationen offenzulegen oder einen Denial of Service Zustand herbeizuf\u00fchren.", "title": "Angriff" }, { "category": "general", "text": "- BIOS/Firmware\n- Hardware Appliance", "title": "Betroffene Betriebssysteme" } ], "publisher": { "category": "other", "contact_details": "csaf-provider@cert-bund.de", "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik", "namespace": "https://www.bsi.bund.de" }, "references": [ { "category": "self", "summary": "WID-SEC-W-2023-1969 - CSAF Version", "url": "https://wid.cert-bund.de/.well-known/csaf/white/2023/wid-sec-w-2023-1969.json" }, { "category": "self", "summary": "WID-SEC-2023-1969 - Portal Version", "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2023-1969" }, { "category": "external", "summary": "HPE Security Bulletin HPESBST04494 vom 2023-08-04", "url": "https://support.hpe.com/hpesc/public/docDisplay?docId=emr_na-hpesbst04494en_us" } ], "source_lang": "en-US", "title": "HPE Fabric OS: Mehrere Schwachstellen erm\u00f6glichen Privilegieneskalation", "tracking": { "current_release_date": "2023-08-06T22:00:00.000+00:00", "generator": { "date": "2024-02-15T17:39:20.279+00:00", "engine": { "name": "BSI-WID", "version": "1.3.0" } }, "id": "WID-SEC-W-2023-1969", "initial_release_date": "2023-08-06T22:00:00.000+00:00", "revision_history": [ { "date": "2023-08-06T22:00:00.000+00:00", "number": "1", "summary": "Initiale Fassung" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "HPE Fabric OS \u003c 9.1.1", "product": { "name": "HPE Fabric OS \u003c 9.1.1", "product_id": "T024587", "product_identification_helper": { "cpe": "cpe:/o:hpe:fabric_os:9.1.1" } } }, { "category": "product_name", "name": "HPE Fabric OS \u003c v8.2.3c", "product": { "name": "HPE Fabric OS \u003c v8.2.3c", "product_id": "T024589", "product_identification_helper": { "cpe": "cpe:/o:hpe:fabric_os:v8.2.3c" } } }, { "category": "product_name", "name": "HPE Fabric OS \u003c 7.4.2j", "product": { "name": "HPE Fabric OS \u003c 7.4.2j", "product_id": "T029096", "product_identification_helper": { "cpe": "cpe:/o:hpe:fabric_os:7.4.2j" } } }, { "category": "product_name", "name": "HPE Fabric OS \u003c v8.2.3d", "product": { "name": "HPE Fabric OS \u003c v8.2.3d", "product_id": "T029097", "product_identification_helper": { "cpe": "cpe:/o:hpe:fabric_os:v8.2.3d" } } }, { "category": "product_name", "name": "HPE Fabric OS \u003c 9.0.1e", "product": { "name": "HPE Fabric OS \u003c 9.0.1e", "product_id": "T029098", "product_identification_helper": { "cpe": "cpe:/o:hpe:fabric_os:9.0.1e" } } }, { "category": "product_name", "name": "HPE Fabric OS \u003c 9.1.1c", "product": { "name": "HPE Fabric OS \u003c 9.1.1c", "product_id": "T029101", "product_identification_helper": { "cpe": "cpe:/o:hpe:fabric_os:9.1.1c" } } } ], "category": "product_name", "name": "Fabric OS" }, { "branches": [ { "category": "product_name", "name": "HPE Switch SAN", "product": { "name": "HPE Switch SAN", "product_id": "T029100", "product_identification_helper": { "cpe": "cpe:/h:hp:switch:san_switch" } } }, { "category": "product_name", "name": "HPE Switch Fibre Channel", "product": { "name": "HPE Switch Fibre Channel", "product_id": "T029104", "product_identification_helper": { "cpe": "cpe:/h:hp:switch:fibre_channel" } } } ], "category": "product_name", "name": "Switch" } ], "category": "vendor", "name": "HPE" } ] }, "vulnerabilities": [ { "cve": "CVE-2023-31928", "notes": [ { "category": "description", "text": "In HPE Fabric OS f\u00fcr HPE Fibre Channel und SAN Switches existieren mehrere Schwachstellen. Diese werden nicht einzeln im Detail beschrieben. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, Informationen offenzulegen, oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T029100", "T029104" ] }, "release_date": "2023-08-06T22:00:00Z", "title": "CVE-2023-31928" }, { "cve": "CVE-2023-31927", "notes": [ { "category": "description", "text": "In HPE Fabric OS f\u00fcr HPE Fibre Channel und SAN Switches existieren mehrere Schwachstellen. Diese werden nicht einzeln im Detail beschrieben. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, Informationen offenzulegen, oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T029100", "T029104" ] }, "release_date": "2023-08-06T22:00:00Z", "title": "CVE-2023-31927" }, { "cve": "CVE-2023-31926", "notes": [ { "category": "description", "text": "In HPE Fabric OS f\u00fcr HPE Fibre Channel und SAN Switches existieren mehrere Schwachstellen. Diese werden nicht einzeln im Detail beschrieben. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, Informationen offenzulegen, oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T029100", "T029104" ] }, "release_date": "2023-08-06T22:00:00Z", "title": "CVE-2023-31926" }, { "cve": "CVE-2023-31432", "notes": [ { "category": "description", "text": "In HPE Fabric OS f\u00fcr HPE Fibre Channel und SAN Switches existieren mehrere Schwachstellen. Diese werden nicht einzeln im Detail beschrieben. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, Informationen offenzulegen, oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T029100", "T029104" ] }, "release_date": "2023-08-06T22:00:00Z", "title": "CVE-2023-31432" }, { "cve": "CVE-2023-31431", "notes": [ { "category": "description", "text": "In HPE Fabric OS f\u00fcr HPE Fibre Channel und SAN Switches existieren mehrere Schwachstellen. Diese werden nicht einzeln im Detail beschrieben. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, Informationen offenzulegen, oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T029100", "T029104" ] }, "release_date": "2023-08-06T22:00:00Z", "title": "CVE-2023-31431" }, { "cve": "CVE-2023-31430", "notes": [ { "category": "description", "text": "In HPE Fabric OS f\u00fcr HPE Fibre Channel und SAN Switches existieren mehrere Schwachstellen. Diese werden nicht einzeln im Detail beschrieben. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, Informationen offenzulegen, oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T029100", "T029104" ] }, "release_date": "2023-08-06T22:00:00Z", "title": "CVE-2023-31430" }, { "cve": "CVE-2023-31429", "notes": [ { "category": "description", "text": "In HPE Fabric OS f\u00fcr HPE Fibre Channel und SAN Switches existieren mehrere Schwachstellen. Diese werden nicht einzeln im Detail beschrieben. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, Informationen offenzulegen, oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T029100", "T029104" ] }, "release_date": "2023-08-06T22:00:00Z", "title": "CVE-2023-31429" }, { "cve": "CVE-2023-31428", "notes": [ { "category": "description", "text": "In HPE Fabric OS f\u00fcr HPE Fibre Channel und SAN Switches existieren mehrere Schwachstellen. Diese werden nicht einzeln im Detail beschrieben. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, Informationen offenzulegen, oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T029100", "T029104" ] }, "release_date": "2023-08-06T22:00:00Z", "title": "CVE-2023-31428" }, { "cve": "CVE-2023-31427", "notes": [ { "category": "description", "text": "In HPE Fabric OS f\u00fcr HPE Fibre Channel und SAN Switches existieren mehrere Schwachstellen. Diese werden nicht einzeln im Detail beschrieben. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, Informationen offenzulegen, oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T029100", "T029104" ] }, "release_date": "2023-08-06T22:00:00Z", "title": "CVE-2023-31427" }, { "cve": "CVE-2023-31426", "notes": [ { "category": "description", "text": "In HPE Fabric OS f\u00fcr HPE Fibre Channel und SAN Switches existieren mehrere Schwachstellen. Diese werden nicht einzeln im Detail beschrieben. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, Informationen offenzulegen, oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T029100", "T029104" ] }, "release_date": "2023-08-06T22:00:00Z", "title": "CVE-2023-31426" }, { "cve": "CVE-2023-31425", "notes": [ { "category": "description", "text": "In HPE Fabric OS f\u00fcr HPE Fibre Channel und SAN Switches existieren mehrere Schwachstellen. Diese werden nicht einzeln im Detail beschrieben. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, Informationen offenzulegen, oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T029100", "T029104" ] }, "release_date": "2023-08-06T22:00:00Z", "title": "CVE-2023-31425" }, { "cve": "CVE-2022-44792", "notes": [ { "category": "description", "text": "In HPE Fabric OS f\u00fcr HPE Fibre Channel und SAN Switches existieren mehrere Schwachstellen. Diese werden nicht einzeln im Detail beschrieben. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, Informationen offenzulegen, oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T029100", "T029104" ] }, "release_date": "2023-08-06T22:00:00Z", "title": "CVE-2022-44792" }, { "cve": "CVE-2022-3786", "notes": [ { "category": "description", "text": "In HPE Fabric OS f\u00fcr HPE Fibre Channel und SAN Switches existieren mehrere Schwachstellen. Diese werden nicht einzeln im Detail beschrieben. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, Informationen offenzulegen, oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T029100", "T029104" ] }, "release_date": "2023-08-06T22:00:00Z", "title": "CVE-2022-3786" }, { "cve": "CVE-2022-3602", "notes": [ { "category": "description", "text": "In HPE Fabric OS f\u00fcr HPE Fibre Channel und SAN Switches existieren mehrere Schwachstellen. Diese werden nicht einzeln im Detail beschrieben. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, Informationen offenzulegen, oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T029100", "T029104" ] }, "release_date": "2023-08-06T22:00:00Z", "title": "CVE-2022-3602" }, { "cve": "CVE-2022-29154", "notes": [ { "category": "description", "text": "In HPE Fabric OS f\u00fcr HPE Fibre Channel und SAN Switches existieren mehrere Schwachstellen. Diese werden nicht einzeln im Detail beschrieben. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, Informationen offenzulegen, oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T029100", "T029104" ] }, "release_date": "2023-08-06T22:00:00Z", "title": "CVE-2022-29154" }, { "cve": "CVE-2022-28615", "notes": [ { "category": "description", "text": "In HPE Fabric OS f\u00fcr HPE Fibre Channel und SAN Switches existieren mehrere Schwachstellen. Diese werden nicht einzeln im Detail beschrieben. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, Informationen offenzulegen, oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T029100", "T029104" ] }, "release_date": "2023-08-06T22:00:00Z", "title": "CVE-2022-28615" }, { "cve": "CVE-2022-28614", "notes": [ { "category": "description", "text": "In HPE Fabric OS f\u00fcr HPE Fibre Channel und SAN Switches existieren mehrere Schwachstellen. Diese werden nicht einzeln im Detail beschrieben. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, Informationen offenzulegen, oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T029100", "T029104" ] }, "release_date": "2023-08-06T22:00:00Z", "title": "CVE-2022-28614" }, { "cve": "CVE-2022-25313", "notes": [ { "category": "description", "text": "In HPE Fabric OS f\u00fcr HPE Fibre Channel und SAN Switches existieren mehrere Schwachstellen. Diese werden nicht einzeln im Detail beschrieben. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, Informationen offenzulegen, oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T029100", "T029104" ] }, "release_date": "2023-08-06T22:00:00Z", "title": "CVE-2022-25313" }, { "cve": "CVE-2022-25236", "notes": [ { "category": "description", "text": "In HPE Fabric OS f\u00fcr HPE Fibre Channel und SAN Switches existieren mehrere Schwachstellen. Diese werden nicht einzeln im Detail beschrieben. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, Informationen offenzulegen, oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T029100", "T029104" ] }, "release_date": "2023-08-06T22:00:00Z", "title": "CVE-2022-25236" }, { "cve": "CVE-2022-25235", "notes": [ { "category": "description", "text": "In HPE Fabric OS f\u00fcr HPE Fibre Channel und SAN Switches existieren mehrere Schwachstellen. Diese werden nicht einzeln im Detail beschrieben. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, Informationen offenzulegen, oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T029100", "T029104" ] }, "release_date": "2023-08-06T22:00:00Z", "title": "CVE-2022-25235" }, { "cve": "CVE-2022-24448", "notes": [ { "category": "description", "text": "In HPE Fabric OS f\u00fcr HPE Fibre Channel und SAN Switches existieren mehrere Schwachstellen. Diese werden nicht einzeln im Detail beschrieben. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, Informationen offenzulegen, oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T029100", "T029104" ] }, "release_date": "2023-08-06T22:00:00Z", "title": "CVE-2022-24448" }, { "cve": "CVE-2022-23219", "notes": [ { "category": "description", "text": "In HPE Fabric OS f\u00fcr HPE Fibre Channel und SAN Switches existieren mehrere Schwachstellen. Diese werden nicht einzeln im Detail beschrieben. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, Informationen offenzulegen, oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T029100", "T029104" ] }, "release_date": "2023-08-06T22:00:00Z", "title": "CVE-2022-23219" }, { "cve": "CVE-2022-2097", "notes": [ { "category": "description", "text": "In HPE Fabric OS f\u00fcr HPE Fibre Channel und SAN Switches existieren mehrere Schwachstellen. Diese werden nicht einzeln im Detail beschrieben. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, Informationen offenzulegen, oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T029100", "T029104" ] }, "release_date": "2023-08-06T22:00:00Z", "title": "CVE-2022-2097" }, { "cve": "CVE-2022-2068", "notes": [ { "category": "description", "text": "In HPE Fabric OS f\u00fcr HPE Fibre Channel und SAN Switches existieren mehrere Schwachstellen. Diese werden nicht einzeln im Detail beschrieben. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, Informationen offenzulegen, oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T029100", "T029104" ] }, "release_date": "2023-08-06T22:00:00Z", "title": "CVE-2022-2068" }, { "cve": "CVE-2022-0778", "notes": [ { "category": "description", "text": "In HPE Fabric OS f\u00fcr HPE Fibre Channel und SAN Switches existieren mehrere Schwachstellen. Diese werden nicht einzeln im Detail beschrieben. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, Informationen offenzulegen, oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T029100", "T029104" ] }, "release_date": "2023-08-06T22:00:00Z", "title": "CVE-2022-0778" }, { "cve": "CVE-2022-0322", "notes": [ { "category": "description", "text": "In HPE Fabric OS f\u00fcr HPE Fibre Channel und SAN Switches existieren mehrere Schwachstellen. Diese werden nicht einzeln im Detail beschrieben. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, Informationen offenzulegen, oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T029100", "T029104" ] }, "release_date": "2023-08-06T22:00:00Z", "title": "CVE-2022-0322" }, { "cve": "CVE-2022-0155", "notes": [ { "category": "description", "text": "In HPE Fabric OS f\u00fcr HPE Fibre Channel und SAN Switches existieren mehrere Schwachstellen. Diese werden nicht einzeln im Detail beschrieben. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, Informationen offenzulegen, oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T029100", "T029104" ] }, "release_date": "2023-08-06T22:00:00Z", "title": "CVE-2022-0155" }, { "cve": "CVE-2021-45486", "notes": [ { "category": "description", "text": "In HPE Fabric OS f\u00fcr HPE Fibre Channel und SAN Switches existieren mehrere Schwachstellen. Diese werden nicht einzeln im Detail beschrieben. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, Informationen offenzulegen, oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T029100", "T029104" ] }, "release_date": "2023-08-06T22:00:00Z", "title": "CVE-2021-45486" }, { "cve": "CVE-2021-45485", "notes": [ { "category": "description", "text": "In HPE Fabric OS f\u00fcr HPE Fibre Channel und SAN Switches existieren mehrere Schwachstellen. Diese werden nicht einzeln im Detail beschrieben. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, Informationen offenzulegen, oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T029100", "T029104" ] }, "release_date": "2023-08-06T22:00:00Z", "title": "CVE-2021-45485" }, { "cve": "CVE-2021-41617", "notes": [ { "category": "description", "text": "In HPE Fabric OS f\u00fcr HPE Fibre Channel und SAN Switches existieren mehrere Schwachstellen. Diese werden nicht einzeln im Detail beschrieben. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, Informationen offenzulegen, oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T029100", "T029104" ] }, "release_date": "2023-08-06T22:00:00Z", "title": "CVE-2021-41617" }, { "cve": "CVE-2021-4145", "notes": [ { "category": "description", "text": "In HPE Fabric OS f\u00fcr HPE Fibre Channel und SAN Switches existieren mehrere Schwachstellen. Diese werden nicht einzeln im Detail beschrieben. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, Informationen offenzulegen, oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T029100", "T029104" ] }, "release_date": "2023-08-06T22:00:00Z", "title": "CVE-2021-4145" }, { "cve": "CVE-2021-39275", "notes": [ { "category": "description", "text": "In HPE Fabric OS f\u00fcr HPE Fibre Channel und SAN Switches existieren mehrere Schwachstellen. Diese werden nicht einzeln im Detail beschrieben. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, Informationen offenzulegen, oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T029100", "T029104" ] }, "release_date": "2023-08-06T22:00:00Z", "title": "CVE-2021-39275" }, { "cve": "CVE-2021-3800", "notes": [ { "category": "description", "text": "In HPE Fabric OS f\u00fcr HPE Fibre Channel und SAN Switches existieren mehrere Schwachstellen. Diese werden nicht einzeln im Detail beschrieben. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, Informationen offenzulegen, oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T029100", "T029104" ] }, "release_date": "2023-08-06T22:00:00Z", "title": "CVE-2021-3800" }, { "cve": "CVE-2021-20193", "notes": [ { "category": "description", "text": "In HPE Fabric OS f\u00fcr HPE Fibre Channel und SAN Switches existieren mehrere Schwachstellen. Diese werden nicht einzeln im Detail beschrieben. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, Informationen offenzulegen, oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T029100", "T029104" ] }, "release_date": "2023-08-06T22:00:00Z", "title": "CVE-2021-20193" }, { "cve": "CVE-2021-0146", "notes": [ { "category": "description", "text": "In HPE Fabric OS f\u00fcr HPE Fibre Channel und SAN Switches existieren mehrere Schwachstellen. Diese werden nicht einzeln im Detail beschrieben. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, Informationen offenzulegen, oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T029100", "T029104" ] }, "release_date": "2023-08-06T22:00:00Z", "title": "CVE-2021-0146" }, { "cve": "CVE-2020-36558", "notes": [ { "category": "description", "text": "In HPE Fabric OS f\u00fcr HPE Fibre Channel und SAN Switches existieren mehrere Schwachstellen. Diese werden nicht einzeln im Detail beschrieben. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, Informationen offenzulegen, oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T029100", "T029104" ] }, "release_date": "2023-08-06T22:00:00Z", "title": "CVE-2020-36558" }, { "cve": "CVE-2020-36557", "notes": [ { "category": "description", "text": "In HPE Fabric OS f\u00fcr HPE Fibre Channel und SAN Switches existieren mehrere Schwachstellen. Diese werden nicht einzeln im Detail beschrieben. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, Informationen offenzulegen, oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T029100", "T029104" ] }, "release_date": "2023-08-06T22:00:00Z", "title": "CVE-2020-36557" }, { "cve": "CVE-2020-15861", "notes": [ { "category": "description", "text": "In HPE Fabric OS f\u00fcr HPE Fibre Channel und SAN Switches existieren mehrere Schwachstellen. Diese werden nicht einzeln im Detail beschrieben. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, Informationen offenzulegen, oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T029100", "T029104" ] }, "release_date": "2023-08-06T22:00:00Z", "title": "CVE-2020-15861" }, { "cve": "CVE-2020-14145", "notes": [ { "category": "description", "text": "In HPE Fabric OS f\u00fcr HPE Fibre Channel und SAN Switches existieren mehrere Schwachstellen. Diese werden nicht einzeln im Detail beschrieben. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, Informationen offenzulegen, oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T029100", "T029104" ] }, "release_date": "2023-08-06T22:00:00Z", "title": "CVE-2020-14145" }, { "cve": "CVE-2019-0220", "notes": [ { "category": "description", "text": "In HPE Fabric OS f\u00fcr HPE Fibre Channel und SAN Switches existieren mehrere Schwachstellen. Diese werden nicht einzeln im Detail beschrieben. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, Informationen offenzulegen, oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T029100", "T029104" ] }, "release_date": "2023-08-06T22:00:00Z", "title": "CVE-2019-0220" }, { "cve": "CVE-2018-7738", "notes": [ { "category": "description", "text": "In HPE Fabric OS f\u00fcr HPE Fibre Channel und SAN Switches existieren mehrere Schwachstellen. Diese werden nicht einzeln im Detail beschrieben. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, Informationen offenzulegen, oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T029100", "T029104" ] }, "release_date": "2023-08-06T22:00:00Z", "title": "CVE-2018-7738" }, { "cve": "CVE-2018-25032", "notes": [ { "category": "description", "text": "In HPE Fabric OS f\u00fcr HPE Fibre Channel und SAN Switches existieren mehrere Schwachstellen. Diese werden nicht einzeln im Detail beschrieben. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, Informationen offenzulegen, oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T029100", "T029104" ] }, "release_date": "2023-08-06T22:00:00Z", "title": "CVE-2018-25032" }, { "cve": "CVE-2018-14404", "notes": [ { "category": "description", "text": "In HPE Fabric OS f\u00fcr HPE Fibre Channel und SAN Switches existieren mehrere Schwachstellen. Diese werden nicht einzeln im Detail beschrieben. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, Informationen offenzulegen, oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T029100", "T029104" ] }, "release_date": "2023-08-06T22:00:00Z", "title": "CVE-2018-14404" }, { "cve": "CVE-2018-14348", "notes": [ { "category": "description", "text": "In HPE Fabric OS f\u00fcr HPE Fibre Channel und SAN Switches existieren mehrere Schwachstellen. Diese werden nicht einzeln im Detail beschrieben. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, Informationen offenzulegen, oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T029100", "T029104" ] }, "release_date": "2023-08-06T22:00:00Z", "title": "CVE-2018-14348" }, { "cve": "CVE-2018-0739", "notes": [ { "category": "description", "text": "In HPE Fabric OS f\u00fcr HPE Fibre Channel und SAN Switches existieren mehrere Schwachstellen. Diese werden nicht einzeln im Detail beschrieben. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, Informationen offenzulegen, oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T029100", "T029104" ] }, "release_date": "2023-08-06T22:00:00Z", "title": "CVE-2018-0739" }, { "cve": "CVE-2014-2524", "notes": [ { "category": "description", "text": "In HPE Fabric OS f\u00fcr HPE Fibre Channel und SAN Switches existieren mehrere Schwachstellen. Diese werden nicht einzeln im Detail beschrieben. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, Informationen offenzulegen, oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T029100", "T029104" ] }, "release_date": "2023-08-06T22:00:00Z", "title": "CVE-2014-2524" }, { "cve": "CVE-2012-0060", "notes": [ { "category": "description", "text": "In HPE Fabric OS f\u00fcr HPE Fibre Channel und SAN Switches existieren mehrere Schwachstellen. Diese werden nicht einzeln im Detail beschrieben. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, Informationen offenzulegen, oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T029100", "T029104" ] }, "release_date": "2023-08-06T22:00:00Z", "title": "CVE-2012-0060" }, { "cve": "CVE-2011-4917", "notes": [ { "category": "description", "text": "In HPE Fabric OS f\u00fcr HPE Fibre Channel und SAN Switches existieren mehrere Schwachstellen. Diese werden nicht einzeln im Detail beschrieben. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, Informationen offenzulegen, oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T029100", "T029104" ] }, "release_date": "2023-08-06T22:00:00Z", "title": "CVE-2011-4917" } ] }
WID-SEC-W-2022-0192
Vulnerability from csaf_certbund
Published
2022-06-07 22:00
Modified
2024-03-26 23:00
Summary
Apache HTTP Server: Mehrere Schwachstellen
Notes
Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.
Produktbeschreibung
Apache ist ein Webserver für verschiedene Plattformen.
Angriff
Ein entfernter, anonymer Angreifer kann mehrere Schwachstellen in Apache HTTP Server ausnutzen, um falsche Informationen darzustellen, vertrauliche Informationen offenzulegen, einen Denial of Service Zustand herzustellen und Sicherheitsmaßnahmen zu umgehen.
Betroffene Betriebssysteme
- F5 Networks
- Hardware Appliance
- Linux
- NetApp Appliance
- Sonstiges
- UNIX
- Windows
{ "document": { "aggregate_severity": { "text": "mittel" }, "category": "csaf_base", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "de-DE", "notes": [ { "category": "legal_disclaimer", "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen." }, { "category": "description", "text": "Apache ist ein Webserver f\u00fcr verschiedene Plattformen.", "title": "Produktbeschreibung" }, { "category": "summary", "text": "Ein entfernter, anonymer Angreifer kann mehrere Schwachstellen in Apache HTTP Server ausnutzen, um falsche Informationen darzustellen, vertrauliche Informationen offenzulegen, einen Denial of Service Zustand herzustellen und Sicherheitsma\u00dfnahmen zu umgehen.", "title": "Angriff" }, { "category": "general", "text": "- F5 Networks\n- Hardware Appliance\n- Linux\n- NetApp Appliance\n- Sonstiges\n- UNIX\n- Windows", "title": "Betroffene Betriebssysteme" } ], "publisher": { "category": "other", "contact_details": "csaf-provider@cert-bund.de", "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik", "namespace": "https://www.bsi.bund.de" }, "references": [ { "category": "self", "summary": "WID-SEC-W-2022-0192 - CSAF Version", "url": "https://wid.cert-bund.de/.well-known/csaf/white/2022/wid-sec-w-2022-0192.json" }, { "category": "self", "summary": "WID-SEC-2022-0192 - Portal Version", "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2022-0192" }, { "category": "external", "summary": "Ubuntu Security Notice USN-5487-1 vom 2022-06-21", "url": "https://ubuntu.com/security/notices/USN-5487-1" }, { "category": "external", "summary": "Apache Security Advisory vom 2022-06-07", "url": "https://httpd.apache.org/security/vulnerabilities_24.html#2.4.54" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2022:2099-1 vom 2022-06-16", "url": "https://lists.suse.com/pipermail/sle-security-updates/2022-June/011297.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2022:2101-1 vom 2022-06-16", "url": "https://lists.suse.com/pipermail/sle-security-updates/2022-June/011298.html" }, { "category": "external", "summary": "IBM Security Bulletin 6595149 vom 2022-06-16", "url": "https://www.ibm.com/blogs/psirt/security-bulletin-multiple-vulnerabilities-in-ibm-http-server-used-by-ibm-websphere-application-server-2/" }, { "category": "external", "summary": "Ubuntu Security Notice USN-5487-2 vom 2022-06-23", "url": "https://ubuntu.com/security/notices/USN-5487-2" }, { "category": "external", "summary": "Ubuntu Security Notice USN-5487-3 vom 2022-06-24", "url": "https://ubuntu.com/security/notices/USN-5487-3" }, { "category": "external", "summary": "F5 Security Advisory K58003591 vom 2022-07-05", "url": "https://support.f5.com/csp/article/K58003591" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2022:2302-1 vom 2022-07-06", "url": "https://lists.suse.com/pipermail/sle-security-updates/2022-July/011423.html" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALAS-2022-1607 vom 2022-07-07", "url": "https://alas.aws.amazon.com/ALAS-2022-1607.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2022:2342-1 vom 2022-07-08", "url": "https://lists.suse.com/pipermail/sle-security-updates/2022-July/011488.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2022:2338-1 vom 2022-07-08", "url": "https://lists.suse.com/pipermail/sle-security-updates/2022-July/011487.html" }, { "category": "external", "summary": "F5 Security Advisory K40582331 vom 2022-07-08", "url": "https://support.f5.com/csp/article/K40582331" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALAS-2022-1812 vom 2022-07-15", "url": "https://alas.aws.amazon.com/AL2/ALAS-2022-1812.html" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALAS-2022-110 vom 2022-07-21", "url": "https://alas.aws.amazon.com/AL2022/ALAS-2022-110.html" }, { "category": "external", "summary": "NetApp Security Advisory NTAP-20220624-0005 vom 2022-07-27", "url": "https://security.netapp.com/advisory/ntap-20220624-0005/" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2022-9675 vom 2022-08-04", "url": "http://linux.oracle.com/errata/ELSA-2022-9675.html" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2022-9676 vom 2022-08-04", "url": "http://linux.oracle.com/errata/ELSA-2022-9676.html" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2022-9680 vom 2022-08-05", "url": "http://linux.oracle.com/errata/ELSA-2022-9680.html" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2022-9682 vom 2022-08-11", "url": "https://linux.oracle.com/errata/ELSA-2022-9682.html" }, { "category": "external", "summary": "Gentoo Linux Security Advisory GLSA-202208-20 vom 2022-08-14", "url": "https://security.gentoo.org/glsa/202208-20" }, { "category": "external", "summary": "QNAP Security Advisory QSA-22-23 vom 2022-08-15", "url": "https://www.qnap.com/de-de/security-advisory/QSA-22-23" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2022-9714 vom 2022-08-17", "url": "http://linux.oracle.com/errata/ELSA-2022-9714.html" }, { "category": "external", "summary": "HCL Article KB0100505 vom 2022-09-21", "url": "https://support.hcltechsw.com/csm?id=kb_article\u0026sysparm_article=KB0100505" }, { "category": "external", "summary": "baramundi Sicherheitsupdate S-2022-01 vom 2022-09-27", "url": "https://www.baramundi.com/de-de/security-info/s-2022-01/" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2022:6753 vom 2022-09-29", "url": "https://access.redhat.com/errata/RHSA-2022:6753" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALAS-2022-202 vom 2022-11-04", "url": "https://alas.aws.amazon.com/AL2022/ALAS-2022-202.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2022:7647 vom 2022-11-08", "url": "https://access.redhat.com/errata/RHSA-2022:7647" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2022:8067 vom 2022-11-15", "url": "https://access.redhat.com/errata/RHSA-2022:8067" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2022-7647 vom 2022-11-15", "url": "https://linux.oracle.com/errata/ELSA-2022-7647.html" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2022-8067 vom 2022-11-22", "url": "https://linux.oracle.com/errata/ELSA-2022-8067.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2022:8840 vom 2022-12-08", "url": "https://access.redhat.com/errata/RHSA-2022:8840" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2022:8841 vom 2022-12-08", "url": "https://access.redhat.com/errata/RHSA-2022:8841" }, { "category": "external", "summary": "IBM Security Bulletin 6595149 abgerufen am 2023-02-17", "url": "https://www.ibm.com/support/pages/node/6595149" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2023-1593 vom 2023-04-05", "url": "https://linux.oracle.com/errata/ELSA-2023-1593.html" }, { "category": "external", "summary": "F5 Security Advisory K26314875 vom 2023-04-06", "url": "https://my.f5.com/manage/s/article/K26314875" }, { "category": "external", "summary": "F5 Security Advisory K40582331 vom 2023-06-22", "url": "https://my.f5.com/manage/s/article/K40582331" }, { "category": "external", "summary": "HPE Securi+y Bulletin", "url": "https://support.hpe.com/hpesc/public/docDisplay?docId=emr_na-hpesbst04494en_us" }, { "category": "external", "summary": "IBM Security Bulletin 7063718 vom 2023-10-31", "url": "https://www.ibm.com/support/pages/node/7063718" }, { "category": "external", "summary": "IBM Security Bulletin 7145265 vom 2024-03-26", "url": "https://www.ibm.com/support/pages/node/7145265" } ], "source_lang": "en-US", "title": "Apache HTTP Server: Mehrere Schwachstellen", "tracking": { "current_release_date": "2024-03-26T23:00:00.000+00:00", "generator": { "date": "2024-03-27T10:38:40.561+00:00", "engine": { "name": "BSI-WID", "version": "1.3.0" } }, "id": "WID-SEC-W-2022-0192", "initial_release_date": "2022-06-07T22:00:00.000+00:00", "revision_history": [ { "date": "2022-06-07T22:00:00.000+00:00", "number": "1", "summary": "Initiale Fassung" }, { "date": "2022-06-16T22:00:00.000+00:00", "number": "2", "summary": "Neue Updates von SUSE und IBM aufgenommen" }, { "date": "2022-06-21T22:00:00.000+00:00", "number": "3", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2022-06-22T22:00:00.000+00:00", "number": "4", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2022-06-23T22:00:00.000+00:00", "number": "5", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2022-07-05T22:00:00.000+00:00", "number": "6", "summary": "F5 stellt neue Informationen bereit" }, { "date": "2022-07-06T22:00:00.000+00:00", "number": "7", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2022-07-07T22:00:00.000+00:00", "number": "8", "summary": "Neue Updates von Amazon aufgenommen" }, { "date": "2022-07-10T22:00:00.000+00:00", "number": "9", "summary": "Neue Updates von SUSE und Informationen von F5 aufgenommen" }, { "date": "2022-07-14T22:00:00.000+00:00", "number": "10", "summary": "Neue Updates von Amazon aufgenommen" }, { "date": "2022-07-21T22:00:00.000+00:00", "number": "11", "summary": "Neue Updates von Amazon aufgenommen" }, { "date": "2022-07-27T22:00:00.000+00:00", "number": "12", "summary": "Neue Updates von NetApp aufgenommen" }, { "date": "2022-08-04T22:00:00.000+00:00", "number": "13", "summary": "Neue Updates von Oracle Linux aufgenommen" }, { "date": "2022-08-07T22:00:00.000+00:00", "number": "14", "summary": "Neue Updates von Oracle Linux aufgenommen" }, { "date": "2022-08-10T22:00:00.000+00:00", "number": "15", "summary": "Neue Updates von Oracle Linux aufgenommen" }, { "date": "2022-08-14T22:00:00.000+00:00", "number": "16", "summary": "Neue Updates von Gentoo aufgenommen" }, { "date": "2022-08-15T22:00:00.000+00:00", "number": "17", "summary": "Neue Updates von QNAP aufgenommen" }, { "date": "2022-08-17T22:00:00.000+00:00", "number": "18", "summary": "Neue Updates von Oracle Linux aufgenommen" }, { "date": "2022-09-20T22:00:00.000+00:00", "number": "19", "summary": "Neue Updates von HCL aufgenommen" }, { "date": "2022-09-27T22:00:00.000+00:00", "number": "20", "summary": "Neue Updates von Baramundi aufgenommen" }, { "date": "2022-09-29T22:00:00.000+00:00", "number": "21", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2022-11-06T23:00:00.000+00:00", "number": "22", "summary": "Neue Updates von Amazon aufgenommen" }, { "date": "2022-11-08T23:00:00.000+00:00", "number": "23", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2022-11-15T23:00:00.000+00:00", "number": "24", "summary": "Neue Updates von Red Hat und Oracle Linux aufgenommen" }, { "date": "2022-11-21T23:00:00.000+00:00", "number": "25", "summary": "Neue Updates von Oracle Linux aufgenommen" }, { "date": "2022-12-08T23:00:00.000+00:00", "number": "26", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2023-02-16T23:00:00.000+00:00", "number": "27", "summary": "Aktualisierung IBM Link wg. nicht mehr erreichbarer URL, Erg\u00e4nzung Produktliste dazu" }, { "date": "2023-04-04T22:00:00.000+00:00", "number": "28", "summary": "Neue Updates von Oracle Linux aufgenommen" }, { "date": "2023-04-10T22:00:00.000+00:00", "number": "29", "summary": "Neue Updates von F5 aufgenommen" }, { "date": "2023-06-22T22:00:00.000+00:00", "number": "30", "summary": "Neue Updates von F5 aufgenommen" }, { "date": "2023-08-13T22:00:00.000+00:00", "number": "31", "summary": "Neue Updates von HP aufgenommen" }, { "date": "2023-10-31T23:00:00.000+00:00", "number": "32", "summary": "Neue Updates von IBM aufgenommen" }, { "date": "2024-03-26T23:00:00.000+00:00", "number": "33", "summary": "Neue Updates von IBM aufgenommen" } ], "status": "final", "version": "33" } }, "product_tree": { "branches": [ { "branches": [ { "category": "product_name", "name": "Amazon Linux 2", "product": { "name": "Amazon Linux 2", "product_id": "398363", "product_identification_helper": { "cpe": "cpe:/o:amazon:linux_2:-" } } } ], "category": "vendor", "name": "Amazon" }, { "branches": [ { "branches": [ { "category": "product_version_range", "name": "\u003c 2.4.54", "product": { "name": "Apache HTTP Server \u003c 2.4.54", "product_id": "T023434", "product_identification_helper": { "cpe": "cpe:/a:apache:http_server:2.4.54" } } } ], "category": "product_name", "name": "HTTP Server" } ], "category": "vendor", "name": "Apache" }, { "branches": [ { "category": "product_name", "name": "Baramundi Management Suite", "product": { "name": "Baramundi Management Suite", "product_id": "T024720", "product_identification_helper": { "cpe": "cpe:/a:baramundi:management_suite:-" } } } ], "category": "vendor", "name": "Baramundi" }, { "branches": [ { "category": "product_name", "name": "Broadcom Brocade Switch", "product": { "name": "Broadcom Brocade Switch", "product_id": "T015844", "product_identification_helper": { "cpe": "cpe:/h:brocade:switch:-" } } } ], "category": "vendor", "name": "Broadcom" }, { "branches": [ { "branches": [ { "category": "product_name", "name": "F5 BIG-IP", "product": { "name": "F5 BIG-IP", "product_id": "T001663", "product_identification_helper": { "cpe": "cpe:/a:f5:big-ip:-" } } }, { "category": "product_version_range", "name": "\u003c 15.1.9", "product": { "name": "F5 BIG-IP \u003c 15.1.9", "product_id": "T028287", "product_identification_helper": { "cpe": "cpe:/a:f5:big-ip:15.1.9" } } } ], "category": "product_name", "name": "BIG-IP" } ], "category": "vendor", "name": "F5" }, { "branches": [ { "category": "product_name", "name": "Gentoo Linux", "product": { "name": "Gentoo Linux", "product_id": "T012167", "product_identification_helper": { "cpe": "cpe:/o:gentoo:linux:-" } } } ], "category": "vendor", "name": "Gentoo" }, { "branches": [ { "category": "product_name", "name": "HCL Commerce", "product": { "name": "HCL Commerce", "product_id": "T019293", "product_identification_helper": { "cpe": "cpe:/a:hcltechsw:commerce:-" } } } ], "category": "vendor", "name": "HCL" }, { "branches": [ { "category": "product_name", "name": "HPE Switch", "product": { "name": "HPE Switch", "product_id": "T005119", "product_identification_helper": { "cpe": "cpe:/h:hp:switch:-" } } } ], "category": "vendor", "name": "HPE" }, { "branches": [ { "branches": [ { "category": "product_version", "name": "8.5", "product": { "name": "IBM HTTP Server 8.5", "product_id": "T001650", "product_identification_helper": { "cpe": "cpe:/a:ibm:http_server:8.5" } } }, { "category": "product_version", "name": "7", "product": { "name": "IBM HTTP Server 7.0", "product_id": "T003674", "product_identification_helper": { "cpe": "cpe:/a:ibm:http_server:7.0" } } }, { "category": "product_version", "name": "8", "product": { "name": "IBM HTTP Server 8.0", "product_id": "T003675", "product_identification_helper": { "cpe": "cpe:/a:ibm:http_server:8.0" } } }, { "category": "product_name", "name": "IBM HTTP Server", "product": { "name": "IBM HTTP Server", "product_id": "T004019", "product_identification_helper": { "cpe": "cpe:/a:ibm:http_server:-" } } }, { "category": "product_version", "name": "9", "product": { "name": "IBM HTTP Server 9.0", "product_id": "T008162", "product_identification_helper": { "cpe": "cpe:/a:ibm:http_server:9.0" } } } ], "category": "product_name", "name": "HTTP Server" }, { "branches": [ { "category": "product_version_range", "name": "\u003c 7.5.0 UP8", "product": { "name": "IBM QRadar SIEM \u003c 7.5.0 UP8", "product_id": "T033681", "product_identification_helper": { "cpe": "cpe:/a:ibm:qradar_siem:7.5.0_up8" } } } ], "category": "product_name", "name": "QRadar SIEM" }, { "branches": [ { "category": "product_version_range", "name": "\u003c 8.0.0.24", "product": { "name": "IBM Rational Build Forge \u003c 8.0.0.24", "product_id": "T030689", "product_identification_helper": { "cpe": "cpe:/a:ibm:rational_build_forge:8.0.0.24" } } } ], "category": "product_name", "name": "Rational Build Forge" }, { "category": "product_name", "name": "IBM WebSphere Application Server", "product": { "name": "IBM WebSphere Application Server", "product_id": "5198", "product_identification_helper": { "cpe": "cpe:/a:ibm:websphere_application_server:-" } } } ], "category": "vendor", "name": "IBM" }, { "branches": [ { "category": "product_name", "name": "NetApp Data ONTAP", "product": { "name": "NetApp Data ONTAP", "product_id": "7654", "product_identification_helper": { "cpe": "cpe:/a:netapp:data_ontap:-" } } } ], "category": "vendor", "name": "NetApp" }, { "branches": [ { "category": "product_name", "name": "Oracle Linux", "product": { "name": "Oracle Linux", "product_id": "T004914", "product_identification_helper": { "cpe": "cpe:/o:oracle:linux:-" } } } ], "category": "vendor", "name": "Oracle" }, { "branches": [ { "category": "product_name", "name": "QNAP NAS", "product": { "name": "QNAP NAS", "product_id": "T017100", "product_identification_helper": { "cpe": "cpe:/h:qnap:nas:-" } } } ], "category": "vendor", "name": "QNAP" }, { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux", "product": { "name": "Red Hat Enterprise Linux", "product_id": "67646", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:-" } } } ], "category": "vendor", "name": "Red Hat" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux", "product": { "name": "SUSE Linux", "product_id": "T002207", "product_identification_helper": { "cpe": "cpe:/o:suse:suse_linux:-" } } } ], "category": "vendor", "name": "SUSE" }, { "branches": [ { "category": "product_name", "name": "Ubuntu Linux", "product": { "name": "Ubuntu Linux", "product_id": "T000126", "product_identification_helper": { "cpe": "cpe:/o:canonical:ubuntu_linux:-" } } } ], "category": "vendor", "name": "Ubuntu" } ] }, "vulnerabilities": [ { "cve": "CVE-2022-26377", "notes": [ { "category": "description", "text": "Es existiert eine Schwachstelle in Apache HTTP Server. Der Fehler besteht aufgrund einer unsachgem\u00e4\u00dfen Validierung von HTTP-Anfragen in mod_proxy_ajp. Ein entfernter, anonymer Angreifer kann diese Schwachstelle ausnutzen, um HTTP-Request-Schmuggel-Angriffe durchzuf\u00fchren. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich." } ], "product_status": { "known_affected": [ "5198", "T003674", "67646", "T003675", "7654", "T015844", "T030689", "T004019", "T005119", "T019293", "T033681", "T012167", "T004914", "T017100", "T002207", "T000126", "T001663", "398363", "T024720", "T001650", "T008162" ] }, "release_date": "2022-06-07T22:00:00Z", "title": "CVE-2022-26377" }, { "cve": "CVE-2022-28330", "notes": [ { "category": "description", "text": "In Apache HTTP Server existieren mehrere Schwachstellen. Die Fehler bestehen aufgrund mehrerer Out-of-Bounds-Reads. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um vertrauliche Informationen offenzulegen." } ], "product_status": { "known_affected": [ "5198", "T003674", "67646", "T003675", "7654", "T015844", "T030689", "T004019", "T005119", "T019293", "T033681", "T012167", "T004914", "T017100", "T002207", "T000126", "T001663", "398363", "T024720", "T001650", "T008162" ] }, "release_date": "2022-06-07T22:00:00Z", "title": "CVE-2022-28330" }, { "cve": "CVE-2022-28614", "notes": [ { "category": "description", "text": "In Apache HTTP Server existieren mehrere Schwachstellen. Die Fehler bestehen aufgrund mehrerer Out-of-Bounds-Reads. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um vertrauliche Informationen offenzulegen." } ], "product_status": { "known_affected": [ "5198", "T003674", "67646", "T003675", "7654", "T015844", "T030689", "T004019", "T005119", "T019293", "T033681", "T012167", "T004914", "T017100", "T002207", "T000126", "T001663", "398363", "T024720", "T001650", "T008162" ] }, "release_date": "2022-06-07T22:00:00Z", "title": "CVE-2022-28614" }, { "cve": "CVE-2022-28615", "notes": [ { "category": "description", "text": "In Apache HTTP Server existieren mehrere Schwachstellen. Die Fehler bestehen aufgrund mehrerer Out-of-Bounds-Reads. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um vertrauliche Informationen offenzulegen." } ], "product_status": { "known_affected": [ "5198", "T003674", "67646", "T003675", "7654", "T015844", "T030689", "T004019", "T005119", "T019293", "T033681", "T012167", "T004914", "T017100", "T002207", "T000126", "T001663", "398363", "T024720", "T001650", "T008162" ] }, "release_date": "2022-06-07T22:00:00Z", "title": "CVE-2022-28615" }, { "cve": "CVE-2022-30556", "notes": [ { "category": "description", "text": "In Apache HTTP Server existieren mehrere Schwachstellen. Die Fehler bestehen aufgrund mehrerer Out-of-Bounds-Reads. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um vertrauliche Informationen offenzulegen." } ], "product_status": { "known_affected": [ "5198", "T003674", "67646", "T003675", "7654", "T015844", "T030689", "T004019", "T005119", "T019293", "T033681", "T012167", "T004914", "T017100", "T002207", "T000126", "T001663", "398363", "T024720", "T001650", "T008162" ] }, "release_date": "2022-06-07T22:00:00Z", "title": "CVE-2022-30556" }, { "cve": "CVE-2022-29404", "notes": [ { "category": "description", "text": "In Apache HTTP Server existieren mehrere Schwachstellen. Die Fehler bestehen aufgrund eines Eingabevalidierungsfehlers und einer Ressourcenersch\u00f6pfung. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand zu verursachen." } ], "product_status": { "known_affected": [ "5198", "T003674", "67646", "T003675", "7654", "T015844", "T030689", "T004019", "T005119", "T019293", "T033681", "T012167", "T004914", "T017100", "T002207", "T000126", "T001663", "398363", "T024720", "T001650", "T008162" ] }, "release_date": "2022-06-07T22:00:00Z", "title": "CVE-2022-29404" }, { "cve": "CVE-2022-30522", "notes": [ { "category": "description", "text": "In Apache HTTP Server existieren mehrere Schwachstellen. Die Fehler bestehen aufgrund eines Eingabevalidierungsfehlers und einer Ressourcenersch\u00f6pfung. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand zu verursachen." } ], "product_status": { "known_affected": [ "5198", "T003674", "67646", "T003675", "7654", "T015844", "T030689", "T004019", "T005119", "T019293", "T033681", "T012167", "T004914", "T017100", "T002207", "T000126", "T001663", "398363", "T024720", "T001650", "T008162" ] }, "release_date": "2022-06-07T22:00:00Z", "title": "CVE-2022-30522" }, { "cve": "CVE-2022-31813", "notes": [ { "category": "description", "text": "Es existiert eine Schwachstelle in Apache HTTP Server. Der Fehler besteht aufgrund eines Fehlers in der mod_proxy-Implementierung, bei dem der Webserver m\u00f6glicherweise die X-Forwarded-*-Header nicht an den Ursprungsserver sendet, basierend auf dem clientseitigen Connection-Header-Hop-by-Hop-Mechanismus. Ein entfernter, anonymer Angreifer kann diese Schwachstelle ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen." } ], "product_status": { "known_affected": [ "5198", "T003674", "67646", "T003675", "7654", "T015844", "T030689", "T004019", "T005119", "T019293", "T033681", "T012167", "T004914", "T017100", "T002207", "T000126", "T001663", "398363", "T024720", "T001650", "T008162" ] }, "release_date": "2022-06-07T22:00:00Z", "title": "CVE-2022-31813" } ] }
WID-SEC-W-2023-1969
Vulnerability from csaf_certbund
Published
2023-08-06 22:00
Modified
2023-08-06 22:00
Summary
HPE Fabric OS: Mehrere Schwachstellen ermöglichen Privilegieneskalation
Notes
Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.
Produktbeschreibung
Fabric OS (FOS) ist ein Betriebssystem für FibreChannel Switches.
Angriff
Ein entfernter, anonymer Angreifer kann mehrere Schwachstellen in HPE Fabric OS für HPE Fibre Channel und SAN Switches ausnutzen, um seine Privilegien zu erhöhen, Informationen offenzulegen oder einen Denial of Service Zustand herbeizuführen.
Betroffene Betriebssysteme
- BIOS/Firmware
- Hardware Appliance
{ "document": { "aggregate_severity": { "text": "hoch" }, "category": "csaf_base", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "de-DE", "notes": [ { "category": "legal_disclaimer", "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen." }, { "category": "description", "text": "Fabric OS (FOS) ist ein Betriebssystem f\u00fcr FibreChannel Switches.", "title": "Produktbeschreibung" }, { "category": "summary", "text": "Ein entfernter, anonymer Angreifer kann mehrere Schwachstellen in HPE Fabric OS f\u00fcr HPE Fibre Channel und SAN Switches ausnutzen, um seine Privilegien zu erh\u00f6hen, Informationen offenzulegen oder einen Denial of Service Zustand herbeizuf\u00fchren.", "title": "Angriff" }, { "category": "general", "text": "- BIOS/Firmware\n- Hardware Appliance", "title": "Betroffene Betriebssysteme" } ], "publisher": { "category": "other", "contact_details": "csaf-provider@cert-bund.de", "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik", "namespace": "https://www.bsi.bund.de" }, "references": [ { "category": "self", "summary": "WID-SEC-W-2023-1969 - CSAF Version", "url": "https://wid.cert-bund.de/.well-known/csaf/white/2023/wid-sec-w-2023-1969.json" }, { "category": "self", "summary": "WID-SEC-2023-1969 - Portal Version", "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2023-1969" }, { "category": "external", "summary": "HPE Security Bulletin HPESBST04494 vom 2023-08-04", "url": "https://support.hpe.com/hpesc/public/docDisplay?docId=emr_na-hpesbst04494en_us" } ], "source_lang": "en-US", "title": "HPE Fabric OS: Mehrere Schwachstellen erm\u00f6glichen Privilegieneskalation", "tracking": { "current_release_date": "2023-08-06T22:00:00.000+00:00", "generator": { "date": "2024-02-15T17:39:20.279+00:00", "engine": { "name": "BSI-WID", "version": "1.3.0" } }, "id": "WID-SEC-W-2023-1969", "initial_release_date": "2023-08-06T22:00:00.000+00:00", "revision_history": [ { "date": "2023-08-06T22:00:00.000+00:00", "number": "1", "summary": "Initiale Fassung" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "HPE Fabric OS \u003c 9.1.1", "product": { "name": "HPE Fabric OS \u003c 9.1.1", "product_id": "T024587", "product_identification_helper": { "cpe": "cpe:/o:hpe:fabric_os:9.1.1" } } }, { "category": "product_name", "name": "HPE Fabric OS \u003c v8.2.3c", "product": { "name": "HPE Fabric OS \u003c v8.2.3c", "product_id": "T024589", "product_identification_helper": { "cpe": "cpe:/o:hpe:fabric_os:v8.2.3c" } } }, { "category": "product_name", "name": "HPE Fabric OS \u003c 7.4.2j", "product": { "name": "HPE Fabric OS \u003c 7.4.2j", "product_id": "T029096", "product_identification_helper": { "cpe": "cpe:/o:hpe:fabric_os:7.4.2j" } } }, { "category": "product_name", "name": "HPE Fabric OS \u003c v8.2.3d", "product": { "name": "HPE Fabric OS \u003c v8.2.3d", "product_id": "T029097", "product_identification_helper": { "cpe": "cpe:/o:hpe:fabric_os:v8.2.3d" } } }, { "category": "product_name", "name": "HPE Fabric OS \u003c 9.0.1e", "product": { "name": "HPE Fabric OS \u003c 9.0.1e", "product_id": "T029098", "product_identification_helper": { "cpe": "cpe:/o:hpe:fabric_os:9.0.1e" } } }, { "category": "product_name", "name": "HPE Fabric OS \u003c 9.1.1c", "product": { "name": "HPE Fabric OS \u003c 9.1.1c", "product_id": "T029101", "product_identification_helper": { "cpe": "cpe:/o:hpe:fabric_os:9.1.1c" } } } ], "category": "product_name", "name": "Fabric OS" }, { "branches": [ { "category": "product_name", "name": "HPE Switch SAN", "product": { "name": "HPE Switch SAN", "product_id": "T029100", "product_identification_helper": { "cpe": "cpe:/h:hp:switch:san_switch" } } }, { "category": "product_name", "name": "HPE Switch Fibre Channel", "product": { "name": "HPE Switch Fibre Channel", "product_id": "T029104", "product_identification_helper": { "cpe": "cpe:/h:hp:switch:fibre_channel" } } } ], "category": "product_name", "name": "Switch" } ], "category": "vendor", "name": "HPE" } ] }, "vulnerabilities": [ { "cve": "CVE-2023-31928", "notes": [ { "category": "description", "text": "In HPE Fabric OS f\u00fcr HPE Fibre Channel und SAN Switches existieren mehrere Schwachstellen. Diese werden nicht einzeln im Detail beschrieben. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, Informationen offenzulegen, oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T029100", "T029104" ] }, "release_date": "2023-08-06T22:00:00Z", "title": "CVE-2023-31928" }, { "cve": "CVE-2023-31927", "notes": [ { "category": "description", "text": "In HPE Fabric OS f\u00fcr HPE Fibre Channel und SAN Switches existieren mehrere Schwachstellen. Diese werden nicht einzeln im Detail beschrieben. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, Informationen offenzulegen, oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T029100", "T029104" ] }, "release_date": "2023-08-06T22:00:00Z", "title": "CVE-2023-31927" }, { "cve": "CVE-2023-31926", "notes": [ { "category": "description", "text": "In HPE Fabric OS f\u00fcr HPE Fibre Channel und SAN Switches existieren mehrere Schwachstellen. Diese werden nicht einzeln im Detail beschrieben. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, Informationen offenzulegen, oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T029100", "T029104" ] }, "release_date": "2023-08-06T22:00:00Z", "title": "CVE-2023-31926" }, { "cve": "CVE-2023-31432", "notes": [ { "category": "description", "text": "In HPE Fabric OS f\u00fcr HPE Fibre Channel und SAN Switches existieren mehrere Schwachstellen. Diese werden nicht einzeln im Detail beschrieben. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, Informationen offenzulegen, oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T029100", "T029104" ] }, "release_date": "2023-08-06T22:00:00Z", "title": "CVE-2023-31432" }, { "cve": "CVE-2023-31431", "notes": [ { "category": "description", "text": "In HPE Fabric OS f\u00fcr HPE Fibre Channel und SAN Switches existieren mehrere Schwachstellen. Diese werden nicht einzeln im Detail beschrieben. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, Informationen offenzulegen, oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T029100", "T029104" ] }, "release_date": "2023-08-06T22:00:00Z", "title": "CVE-2023-31431" }, { "cve": "CVE-2023-31430", "notes": [ { "category": "description", "text": "In HPE Fabric OS f\u00fcr HPE Fibre Channel und SAN Switches existieren mehrere Schwachstellen. Diese werden nicht einzeln im Detail beschrieben. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, Informationen offenzulegen, oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T029100", "T029104" ] }, "release_date": "2023-08-06T22:00:00Z", "title": "CVE-2023-31430" }, { "cve": "CVE-2023-31429", "notes": [ { "category": "description", "text": "In HPE Fabric OS f\u00fcr HPE Fibre Channel und SAN Switches existieren mehrere Schwachstellen. Diese werden nicht einzeln im Detail beschrieben. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, Informationen offenzulegen, oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T029100", "T029104" ] }, "release_date": "2023-08-06T22:00:00Z", "title": "CVE-2023-31429" }, { "cve": "CVE-2023-31428", "notes": [ { "category": "description", "text": "In HPE Fabric OS f\u00fcr HPE Fibre Channel und SAN Switches existieren mehrere Schwachstellen. Diese werden nicht einzeln im Detail beschrieben. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, Informationen offenzulegen, oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T029100", "T029104" ] }, "release_date": "2023-08-06T22:00:00Z", "title": "CVE-2023-31428" }, { "cve": "CVE-2023-31427", "notes": [ { "category": "description", "text": "In HPE Fabric OS f\u00fcr HPE Fibre Channel und SAN Switches existieren mehrere Schwachstellen. Diese werden nicht einzeln im Detail beschrieben. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, Informationen offenzulegen, oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T029100", "T029104" ] }, "release_date": "2023-08-06T22:00:00Z", "title": "CVE-2023-31427" }, { "cve": "CVE-2023-31426", "notes": [ { "category": "description", "text": "In HPE Fabric OS f\u00fcr HPE Fibre Channel und SAN Switches existieren mehrere Schwachstellen. Diese werden nicht einzeln im Detail beschrieben. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, Informationen offenzulegen, oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T029100", "T029104" ] }, "release_date": "2023-08-06T22:00:00Z", "title": "CVE-2023-31426" }, { "cve": "CVE-2023-31425", "notes": [ { "category": "description", "text": "In HPE Fabric OS f\u00fcr HPE Fibre Channel und SAN Switches existieren mehrere Schwachstellen. Diese werden nicht einzeln im Detail beschrieben. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, Informationen offenzulegen, oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T029100", "T029104" ] }, "release_date": "2023-08-06T22:00:00Z", "title": "CVE-2023-31425" }, { "cve": "CVE-2022-44792", "notes": [ { "category": "description", "text": "In HPE Fabric OS f\u00fcr HPE Fibre Channel und SAN Switches existieren mehrere Schwachstellen. Diese werden nicht einzeln im Detail beschrieben. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, Informationen offenzulegen, oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T029100", "T029104" ] }, "release_date": "2023-08-06T22:00:00Z", "title": "CVE-2022-44792" }, { "cve": "CVE-2022-3786", "notes": [ { "category": "description", "text": "In HPE Fabric OS f\u00fcr HPE Fibre Channel und SAN Switches existieren mehrere Schwachstellen. Diese werden nicht einzeln im Detail beschrieben. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, Informationen offenzulegen, oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T029100", "T029104" ] }, "release_date": "2023-08-06T22:00:00Z", "title": "CVE-2022-3786" }, { "cve": "CVE-2022-3602", "notes": [ { "category": "description", "text": "In HPE Fabric OS f\u00fcr HPE Fibre Channel und SAN Switches existieren mehrere Schwachstellen. Diese werden nicht einzeln im Detail beschrieben. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, Informationen offenzulegen, oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T029100", "T029104" ] }, "release_date": "2023-08-06T22:00:00Z", "title": "CVE-2022-3602" }, { "cve": "CVE-2022-29154", "notes": [ { "category": "description", "text": "In HPE Fabric OS f\u00fcr HPE Fibre Channel und SAN Switches existieren mehrere Schwachstellen. Diese werden nicht einzeln im Detail beschrieben. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, Informationen offenzulegen, oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T029100", "T029104" ] }, "release_date": "2023-08-06T22:00:00Z", "title": "CVE-2022-29154" }, { "cve": "CVE-2022-28615", "notes": [ { "category": "description", "text": "In HPE Fabric OS f\u00fcr HPE Fibre Channel und SAN Switches existieren mehrere Schwachstellen. Diese werden nicht einzeln im Detail beschrieben. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, Informationen offenzulegen, oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T029100", "T029104" ] }, "release_date": "2023-08-06T22:00:00Z", "title": "CVE-2022-28615" }, { "cve": "CVE-2022-28614", "notes": [ { "category": "description", "text": "In HPE Fabric OS f\u00fcr HPE Fibre Channel und SAN Switches existieren mehrere Schwachstellen. Diese werden nicht einzeln im Detail beschrieben. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, Informationen offenzulegen, oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T029100", "T029104" ] }, "release_date": "2023-08-06T22:00:00Z", "title": "CVE-2022-28614" }, { "cve": "CVE-2022-25313", "notes": [ { "category": "description", "text": "In HPE Fabric OS f\u00fcr HPE Fibre Channel und SAN Switches existieren mehrere Schwachstellen. Diese werden nicht einzeln im Detail beschrieben. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, Informationen offenzulegen, oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T029100", "T029104" ] }, "release_date": "2023-08-06T22:00:00Z", "title": "CVE-2022-25313" }, { "cve": "CVE-2022-25236", "notes": [ { "category": "description", "text": "In HPE Fabric OS f\u00fcr HPE Fibre Channel und SAN Switches existieren mehrere Schwachstellen. Diese werden nicht einzeln im Detail beschrieben. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, Informationen offenzulegen, oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T029100", "T029104" ] }, "release_date": "2023-08-06T22:00:00Z", "title": "CVE-2022-25236" }, { "cve": "CVE-2022-25235", "notes": [ { "category": "description", "text": "In HPE Fabric OS f\u00fcr HPE Fibre Channel und SAN Switches existieren mehrere Schwachstellen. Diese werden nicht einzeln im Detail beschrieben. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, Informationen offenzulegen, oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T029100", "T029104" ] }, "release_date": "2023-08-06T22:00:00Z", "title": "CVE-2022-25235" }, { "cve": "CVE-2022-24448", "notes": [ { "category": "description", "text": "In HPE Fabric OS f\u00fcr HPE Fibre Channel und SAN Switches existieren mehrere Schwachstellen. Diese werden nicht einzeln im Detail beschrieben. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, Informationen offenzulegen, oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T029100", "T029104" ] }, "release_date": "2023-08-06T22:00:00Z", "title": "CVE-2022-24448" }, { "cve": "CVE-2022-23219", "notes": [ { "category": "description", "text": "In HPE Fabric OS f\u00fcr HPE Fibre Channel und SAN Switches existieren mehrere Schwachstellen. Diese werden nicht einzeln im Detail beschrieben. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, Informationen offenzulegen, oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T029100", "T029104" ] }, "release_date": "2023-08-06T22:00:00Z", "title": "CVE-2022-23219" }, { "cve": "CVE-2022-2097", "notes": [ { "category": "description", "text": "In HPE Fabric OS f\u00fcr HPE Fibre Channel und SAN Switches existieren mehrere Schwachstellen. Diese werden nicht einzeln im Detail beschrieben. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, Informationen offenzulegen, oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T029100", "T029104" ] }, "release_date": "2023-08-06T22:00:00Z", "title": "CVE-2022-2097" }, { "cve": "CVE-2022-2068", "notes": [ { "category": "description", "text": "In HPE Fabric OS f\u00fcr HPE Fibre Channel und SAN Switches existieren mehrere Schwachstellen. Diese werden nicht einzeln im Detail beschrieben. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, Informationen offenzulegen, oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T029100", "T029104" ] }, "release_date": "2023-08-06T22:00:00Z", "title": "CVE-2022-2068" }, { "cve": "CVE-2022-0778", "notes": [ { "category": "description", "text": "In HPE Fabric OS f\u00fcr HPE Fibre Channel und SAN Switches existieren mehrere Schwachstellen. Diese werden nicht einzeln im Detail beschrieben. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, Informationen offenzulegen, oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T029100", "T029104" ] }, "release_date": "2023-08-06T22:00:00Z", "title": "CVE-2022-0778" }, { "cve": "CVE-2022-0322", "notes": [ { "category": "description", "text": "In HPE Fabric OS f\u00fcr HPE Fibre Channel und SAN Switches existieren mehrere Schwachstellen. Diese werden nicht einzeln im Detail beschrieben. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, Informationen offenzulegen, oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T029100", "T029104" ] }, "release_date": "2023-08-06T22:00:00Z", "title": "CVE-2022-0322" }, { "cve": "CVE-2022-0155", "notes": [ { "category": "description", "text": "In HPE Fabric OS f\u00fcr HPE Fibre Channel und SAN Switches existieren mehrere Schwachstellen. Diese werden nicht einzeln im Detail beschrieben. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, Informationen offenzulegen, oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T029100", "T029104" ] }, "release_date": "2023-08-06T22:00:00Z", "title": "CVE-2022-0155" }, { "cve": "CVE-2021-45486", "notes": [ { "category": "description", "text": "In HPE Fabric OS f\u00fcr HPE Fibre Channel und SAN Switches existieren mehrere Schwachstellen. Diese werden nicht einzeln im Detail beschrieben. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, Informationen offenzulegen, oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T029100", "T029104" ] }, "release_date": "2023-08-06T22:00:00Z", "title": "CVE-2021-45486" }, { "cve": "CVE-2021-45485", "notes": [ { "category": "description", "text": "In HPE Fabric OS f\u00fcr HPE Fibre Channel und SAN Switches existieren mehrere Schwachstellen. Diese werden nicht einzeln im Detail beschrieben. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, Informationen offenzulegen, oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T029100", "T029104" ] }, "release_date": "2023-08-06T22:00:00Z", "title": "CVE-2021-45485" }, { "cve": "CVE-2021-41617", "notes": [ { "category": "description", "text": "In HPE Fabric OS f\u00fcr HPE Fibre Channel und SAN Switches existieren mehrere Schwachstellen. Diese werden nicht einzeln im Detail beschrieben. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, Informationen offenzulegen, oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T029100", "T029104" ] }, "release_date": "2023-08-06T22:00:00Z", "title": "CVE-2021-41617" }, { "cve": "CVE-2021-4145", "notes": [ { "category": "description", "text": "In HPE Fabric OS f\u00fcr HPE Fibre Channel und SAN Switches existieren mehrere Schwachstellen. Diese werden nicht einzeln im Detail beschrieben. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, Informationen offenzulegen, oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T029100", "T029104" ] }, "release_date": "2023-08-06T22:00:00Z", "title": "CVE-2021-4145" }, { "cve": "CVE-2021-39275", "notes": [ { "category": "description", "text": "In HPE Fabric OS f\u00fcr HPE Fibre Channel und SAN Switches existieren mehrere Schwachstellen. Diese werden nicht einzeln im Detail beschrieben. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, Informationen offenzulegen, oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T029100", "T029104" ] }, "release_date": "2023-08-06T22:00:00Z", "title": "CVE-2021-39275" }, { "cve": "CVE-2021-3800", "notes": [ { "category": "description", "text": "In HPE Fabric OS f\u00fcr HPE Fibre Channel und SAN Switches existieren mehrere Schwachstellen. Diese werden nicht einzeln im Detail beschrieben. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, Informationen offenzulegen, oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T029100", "T029104" ] }, "release_date": "2023-08-06T22:00:00Z", "title": "CVE-2021-3800" }, { "cve": "CVE-2021-20193", "notes": [ { "category": "description", "text": "In HPE Fabric OS f\u00fcr HPE Fibre Channel und SAN Switches existieren mehrere Schwachstellen. Diese werden nicht einzeln im Detail beschrieben. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, Informationen offenzulegen, oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T029100", "T029104" ] }, "release_date": "2023-08-06T22:00:00Z", "title": "CVE-2021-20193" }, { "cve": "CVE-2021-0146", "notes": [ { "category": "description", "text": "In HPE Fabric OS f\u00fcr HPE Fibre Channel und SAN Switches existieren mehrere Schwachstellen. Diese werden nicht einzeln im Detail beschrieben. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, Informationen offenzulegen, oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T029100", "T029104" ] }, "release_date": "2023-08-06T22:00:00Z", "title": "CVE-2021-0146" }, { "cve": "CVE-2020-36558", "notes": [ { "category": "description", "text": "In HPE Fabric OS f\u00fcr HPE Fibre Channel und SAN Switches existieren mehrere Schwachstellen. Diese werden nicht einzeln im Detail beschrieben. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, Informationen offenzulegen, oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T029100", "T029104" ] }, "release_date": "2023-08-06T22:00:00Z", "title": "CVE-2020-36558" }, { "cve": "CVE-2020-36557", "notes": [ { "category": "description", "text": "In HPE Fabric OS f\u00fcr HPE Fibre Channel und SAN Switches existieren mehrere Schwachstellen. Diese werden nicht einzeln im Detail beschrieben. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, Informationen offenzulegen, oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T029100", "T029104" ] }, "release_date": "2023-08-06T22:00:00Z", "title": "CVE-2020-36557" }, { "cve": "CVE-2020-15861", "notes": [ { "category": "description", "text": "In HPE Fabric OS f\u00fcr HPE Fibre Channel und SAN Switches existieren mehrere Schwachstellen. Diese werden nicht einzeln im Detail beschrieben. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, Informationen offenzulegen, oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T029100", "T029104" ] }, "release_date": "2023-08-06T22:00:00Z", "title": "CVE-2020-15861" }, { "cve": "CVE-2020-14145", "notes": [ { "category": "description", "text": "In HPE Fabric OS f\u00fcr HPE Fibre Channel und SAN Switches existieren mehrere Schwachstellen. Diese werden nicht einzeln im Detail beschrieben. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, Informationen offenzulegen, oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T029100", "T029104" ] }, "release_date": "2023-08-06T22:00:00Z", "title": "CVE-2020-14145" }, { "cve": "CVE-2019-0220", "notes": [ { "category": "description", "text": "In HPE Fabric OS f\u00fcr HPE Fibre Channel und SAN Switches existieren mehrere Schwachstellen. Diese werden nicht einzeln im Detail beschrieben. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, Informationen offenzulegen, oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T029100", "T029104" ] }, "release_date": "2023-08-06T22:00:00Z", "title": "CVE-2019-0220" }, { "cve": "CVE-2018-7738", "notes": [ { "category": "description", "text": "In HPE Fabric OS f\u00fcr HPE Fibre Channel und SAN Switches existieren mehrere Schwachstellen. Diese werden nicht einzeln im Detail beschrieben. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, Informationen offenzulegen, oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T029100", "T029104" ] }, "release_date": "2023-08-06T22:00:00Z", "title": "CVE-2018-7738" }, { "cve": "CVE-2018-25032", "notes": [ { "category": "description", "text": "In HPE Fabric OS f\u00fcr HPE Fibre Channel und SAN Switches existieren mehrere Schwachstellen. Diese werden nicht einzeln im Detail beschrieben. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, Informationen offenzulegen, oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T029100", "T029104" ] }, "release_date": "2023-08-06T22:00:00Z", "title": "CVE-2018-25032" }, { "cve": "CVE-2018-14404", "notes": [ { "category": "description", "text": "In HPE Fabric OS f\u00fcr HPE Fibre Channel und SAN Switches existieren mehrere Schwachstellen. Diese werden nicht einzeln im Detail beschrieben. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, Informationen offenzulegen, oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T029100", "T029104" ] }, "release_date": "2023-08-06T22:00:00Z", "title": "CVE-2018-14404" }, { "cve": "CVE-2018-14348", "notes": [ { "category": "description", "text": "In HPE Fabric OS f\u00fcr HPE Fibre Channel und SAN Switches existieren mehrere Schwachstellen. Diese werden nicht einzeln im Detail beschrieben. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, Informationen offenzulegen, oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T029100", "T029104" ] }, "release_date": "2023-08-06T22:00:00Z", "title": "CVE-2018-14348" }, { "cve": "CVE-2018-0739", "notes": [ { "category": "description", "text": "In HPE Fabric OS f\u00fcr HPE Fibre Channel und SAN Switches existieren mehrere Schwachstellen. Diese werden nicht einzeln im Detail beschrieben. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, Informationen offenzulegen, oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T029100", "T029104" ] }, "release_date": "2023-08-06T22:00:00Z", "title": "CVE-2018-0739" }, { "cve": "CVE-2014-2524", "notes": [ { "category": "description", "text": "In HPE Fabric OS f\u00fcr HPE Fibre Channel und SAN Switches existieren mehrere Schwachstellen. Diese werden nicht einzeln im Detail beschrieben. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, Informationen offenzulegen, oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T029100", "T029104" ] }, "release_date": "2023-08-06T22:00:00Z", "title": "CVE-2014-2524" }, { "cve": "CVE-2012-0060", "notes": [ { "category": "description", "text": "In HPE Fabric OS f\u00fcr HPE Fibre Channel und SAN Switches existieren mehrere Schwachstellen. Diese werden nicht einzeln im Detail beschrieben. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, Informationen offenzulegen, oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T029100", "T029104" ] }, "release_date": "2023-08-06T22:00:00Z", "title": "CVE-2012-0060" }, { "cve": "CVE-2011-4917", "notes": [ { "category": "description", "text": "In HPE Fabric OS f\u00fcr HPE Fibre Channel und SAN Switches existieren mehrere Schwachstellen. Diese werden nicht einzeln im Detail beschrieben. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, Informationen offenzulegen, oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T029100", "T029104" ] }, "release_date": "2023-08-06T22:00:00Z", "title": "CVE-2011-4917" } ] }
wid-sec-w-2022-0192
Vulnerability from csaf_certbund
Published
2022-06-07 22:00
Modified
2024-03-26 23:00
Summary
Apache HTTP Server: Mehrere Schwachstellen
Notes
Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.
Produktbeschreibung
Apache ist ein Webserver für verschiedene Plattformen.
Angriff
Ein entfernter, anonymer Angreifer kann mehrere Schwachstellen in Apache HTTP Server ausnutzen, um falsche Informationen darzustellen, vertrauliche Informationen offenzulegen, einen Denial of Service Zustand herzustellen und Sicherheitsmaßnahmen zu umgehen.
Betroffene Betriebssysteme
- F5 Networks
- Hardware Appliance
- Linux
- NetApp Appliance
- Sonstiges
- UNIX
- Windows
{ "document": { "aggregate_severity": { "text": "mittel" }, "category": "csaf_base", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "de-DE", "notes": [ { "category": "legal_disclaimer", "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen." }, { "category": "description", "text": "Apache ist ein Webserver f\u00fcr verschiedene Plattformen.", "title": "Produktbeschreibung" }, { "category": "summary", "text": "Ein entfernter, anonymer Angreifer kann mehrere Schwachstellen in Apache HTTP Server ausnutzen, um falsche Informationen darzustellen, vertrauliche Informationen offenzulegen, einen Denial of Service Zustand herzustellen und Sicherheitsma\u00dfnahmen zu umgehen.", "title": "Angriff" }, { "category": "general", "text": "- F5 Networks\n- Hardware Appliance\n- Linux\n- NetApp Appliance\n- Sonstiges\n- UNIX\n- Windows", "title": "Betroffene Betriebssysteme" } ], "publisher": { "category": "other", "contact_details": "csaf-provider@cert-bund.de", "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik", "namespace": "https://www.bsi.bund.de" }, "references": [ { "category": "self", "summary": "WID-SEC-W-2022-0192 - CSAF Version", "url": "https://wid.cert-bund.de/.well-known/csaf/white/2022/wid-sec-w-2022-0192.json" }, { "category": "self", "summary": "WID-SEC-2022-0192 - Portal Version", "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2022-0192" }, { "category": "external", "summary": "Ubuntu Security Notice USN-5487-1 vom 2022-06-21", "url": "https://ubuntu.com/security/notices/USN-5487-1" }, { "category": "external", "summary": "Apache Security Advisory vom 2022-06-07", "url": "https://httpd.apache.org/security/vulnerabilities_24.html#2.4.54" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2022:2099-1 vom 2022-06-16", "url": "https://lists.suse.com/pipermail/sle-security-updates/2022-June/011297.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2022:2101-1 vom 2022-06-16", "url": "https://lists.suse.com/pipermail/sle-security-updates/2022-June/011298.html" }, { "category": "external", "summary": "IBM Security Bulletin 6595149 vom 2022-06-16", "url": "https://www.ibm.com/blogs/psirt/security-bulletin-multiple-vulnerabilities-in-ibm-http-server-used-by-ibm-websphere-application-server-2/" }, { "category": "external", "summary": "Ubuntu Security Notice USN-5487-2 vom 2022-06-23", "url": "https://ubuntu.com/security/notices/USN-5487-2" }, { "category": "external", "summary": "Ubuntu Security Notice USN-5487-3 vom 2022-06-24", "url": "https://ubuntu.com/security/notices/USN-5487-3" }, { "category": "external", "summary": "F5 Security Advisory K58003591 vom 2022-07-05", "url": "https://support.f5.com/csp/article/K58003591" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2022:2302-1 vom 2022-07-06", "url": "https://lists.suse.com/pipermail/sle-security-updates/2022-July/011423.html" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALAS-2022-1607 vom 2022-07-07", "url": "https://alas.aws.amazon.com/ALAS-2022-1607.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2022:2342-1 vom 2022-07-08", "url": "https://lists.suse.com/pipermail/sle-security-updates/2022-July/011488.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2022:2338-1 vom 2022-07-08", "url": "https://lists.suse.com/pipermail/sle-security-updates/2022-July/011487.html" }, { "category": "external", "summary": "F5 Security Advisory K40582331 vom 2022-07-08", "url": "https://support.f5.com/csp/article/K40582331" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALAS-2022-1812 vom 2022-07-15", "url": "https://alas.aws.amazon.com/AL2/ALAS-2022-1812.html" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALAS-2022-110 vom 2022-07-21", "url": "https://alas.aws.amazon.com/AL2022/ALAS-2022-110.html" }, { "category": "external", "summary": "NetApp Security Advisory NTAP-20220624-0005 vom 2022-07-27", "url": "https://security.netapp.com/advisory/ntap-20220624-0005/" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2022-9675 vom 2022-08-04", "url": "http://linux.oracle.com/errata/ELSA-2022-9675.html" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2022-9676 vom 2022-08-04", "url": "http://linux.oracle.com/errata/ELSA-2022-9676.html" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2022-9680 vom 2022-08-05", "url": "http://linux.oracle.com/errata/ELSA-2022-9680.html" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2022-9682 vom 2022-08-11", "url": "https://linux.oracle.com/errata/ELSA-2022-9682.html" }, { "category": "external", "summary": "Gentoo Linux Security Advisory GLSA-202208-20 vom 2022-08-14", "url": "https://security.gentoo.org/glsa/202208-20" }, { "category": "external", "summary": "QNAP Security Advisory QSA-22-23 vom 2022-08-15", "url": "https://www.qnap.com/de-de/security-advisory/QSA-22-23" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2022-9714 vom 2022-08-17", "url": "http://linux.oracle.com/errata/ELSA-2022-9714.html" }, { "category": "external", "summary": "HCL Article KB0100505 vom 2022-09-21", "url": "https://support.hcltechsw.com/csm?id=kb_article\u0026sysparm_article=KB0100505" }, { "category": "external", "summary": "baramundi Sicherheitsupdate S-2022-01 vom 2022-09-27", "url": "https://www.baramundi.com/de-de/security-info/s-2022-01/" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2022:6753 vom 2022-09-29", "url": "https://access.redhat.com/errata/RHSA-2022:6753" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALAS-2022-202 vom 2022-11-04", "url": "https://alas.aws.amazon.com/AL2022/ALAS-2022-202.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2022:7647 vom 2022-11-08", "url": "https://access.redhat.com/errata/RHSA-2022:7647" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2022:8067 vom 2022-11-15", "url": "https://access.redhat.com/errata/RHSA-2022:8067" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2022-7647 vom 2022-11-15", "url": "https://linux.oracle.com/errata/ELSA-2022-7647.html" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2022-8067 vom 2022-11-22", "url": "https://linux.oracle.com/errata/ELSA-2022-8067.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2022:8840 vom 2022-12-08", "url": "https://access.redhat.com/errata/RHSA-2022:8840" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2022:8841 vom 2022-12-08", "url": "https://access.redhat.com/errata/RHSA-2022:8841" }, { "category": "external", "summary": "IBM Security Bulletin 6595149 abgerufen am 2023-02-17", "url": "https://www.ibm.com/support/pages/node/6595149" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2023-1593 vom 2023-04-05", "url": "https://linux.oracle.com/errata/ELSA-2023-1593.html" }, { "category": "external", "summary": "F5 Security Advisory K26314875 vom 2023-04-06", "url": "https://my.f5.com/manage/s/article/K26314875" }, { "category": "external", "summary": "F5 Security Advisory K40582331 vom 2023-06-22", "url": "https://my.f5.com/manage/s/article/K40582331" }, { "category": "external", "summary": "HPE Securi+y Bulletin", "url": "https://support.hpe.com/hpesc/public/docDisplay?docId=emr_na-hpesbst04494en_us" }, { "category": "external", "summary": "IBM Security Bulletin 7063718 vom 2023-10-31", "url": "https://www.ibm.com/support/pages/node/7063718" }, { "category": "external", "summary": "IBM Security Bulletin 7145265 vom 2024-03-26", "url": "https://www.ibm.com/support/pages/node/7145265" } ], "source_lang": "en-US", "title": "Apache HTTP Server: Mehrere Schwachstellen", "tracking": { "current_release_date": "2024-03-26T23:00:00.000+00:00", "generator": { "date": "2024-03-27T10:38:40.561+00:00", "engine": { "name": "BSI-WID", "version": "1.3.0" } }, "id": "WID-SEC-W-2022-0192", "initial_release_date": "2022-06-07T22:00:00.000+00:00", "revision_history": [ { "date": "2022-06-07T22:00:00.000+00:00", "number": "1", "summary": "Initiale Fassung" }, { "date": "2022-06-16T22:00:00.000+00:00", "number": "2", "summary": "Neue Updates von SUSE und IBM aufgenommen" }, { "date": "2022-06-21T22:00:00.000+00:00", "number": "3", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2022-06-22T22:00:00.000+00:00", "number": "4", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2022-06-23T22:00:00.000+00:00", "number": "5", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2022-07-05T22:00:00.000+00:00", "number": "6", "summary": "F5 stellt neue Informationen bereit" }, { "date": "2022-07-06T22:00:00.000+00:00", "number": "7", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2022-07-07T22:00:00.000+00:00", "number": "8", "summary": "Neue Updates von Amazon aufgenommen" }, { "date": "2022-07-10T22:00:00.000+00:00", "number": "9", "summary": "Neue Updates von SUSE und Informationen von F5 aufgenommen" }, { "date": "2022-07-14T22:00:00.000+00:00", "number": "10", "summary": "Neue Updates von Amazon aufgenommen" }, { "date": "2022-07-21T22:00:00.000+00:00", "number": "11", "summary": "Neue Updates von Amazon aufgenommen" }, { "date": "2022-07-27T22:00:00.000+00:00", "number": "12", "summary": "Neue Updates von NetApp aufgenommen" }, { "date": "2022-08-04T22:00:00.000+00:00", "number": "13", "summary": "Neue Updates von Oracle Linux aufgenommen" }, { "date": "2022-08-07T22:00:00.000+00:00", "number": "14", "summary": "Neue Updates von Oracle Linux aufgenommen" }, { "date": "2022-08-10T22:00:00.000+00:00", "number": "15", "summary": "Neue Updates von Oracle Linux aufgenommen" }, { "date": "2022-08-14T22:00:00.000+00:00", "number": "16", "summary": "Neue Updates von Gentoo aufgenommen" }, { "date": "2022-08-15T22:00:00.000+00:00", "number": "17", "summary": "Neue Updates von QNAP aufgenommen" }, { "date": "2022-08-17T22:00:00.000+00:00", "number": "18", "summary": "Neue Updates von Oracle Linux aufgenommen" }, { "date": "2022-09-20T22:00:00.000+00:00", "number": "19", "summary": "Neue Updates von HCL aufgenommen" }, { "date": "2022-09-27T22:00:00.000+00:00", "number": "20", "summary": "Neue Updates von Baramundi aufgenommen" }, { "date": "2022-09-29T22:00:00.000+00:00", "number": "21", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2022-11-06T23:00:00.000+00:00", "number": "22", "summary": "Neue Updates von Amazon aufgenommen" }, { "date": "2022-11-08T23:00:00.000+00:00", "number": "23", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2022-11-15T23:00:00.000+00:00", "number": "24", "summary": "Neue Updates von Red Hat und Oracle Linux aufgenommen" }, { "date": "2022-11-21T23:00:00.000+00:00", "number": "25", "summary": "Neue Updates von Oracle Linux aufgenommen" }, { "date": "2022-12-08T23:00:00.000+00:00", "number": "26", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2023-02-16T23:00:00.000+00:00", "number": "27", "summary": "Aktualisierung IBM Link wg. nicht mehr erreichbarer URL, Erg\u00e4nzung Produktliste dazu" }, { "date": "2023-04-04T22:00:00.000+00:00", "number": "28", "summary": "Neue Updates von Oracle Linux aufgenommen" }, { "date": "2023-04-10T22:00:00.000+00:00", "number": "29", "summary": "Neue Updates von F5 aufgenommen" }, { "date": "2023-06-22T22:00:00.000+00:00", "number": "30", "summary": "Neue Updates von F5 aufgenommen" }, { "date": "2023-08-13T22:00:00.000+00:00", "number": "31", "summary": "Neue Updates von HP aufgenommen" }, { "date": "2023-10-31T23:00:00.000+00:00", "number": "32", "summary": "Neue Updates von IBM aufgenommen" }, { "date": "2024-03-26T23:00:00.000+00:00", "number": "33", "summary": "Neue Updates von IBM aufgenommen" } ], "status": "final", "version": "33" } }, "product_tree": { "branches": [ { "branches": [ { "category": "product_name", "name": "Amazon Linux 2", "product": { "name": "Amazon Linux 2", "product_id": "398363", "product_identification_helper": { "cpe": "cpe:/o:amazon:linux_2:-" } } } ], "category": "vendor", "name": "Amazon" }, { "branches": [ { "branches": [ { "category": "product_version_range", "name": "\u003c 2.4.54", "product": { "name": "Apache HTTP Server \u003c 2.4.54", "product_id": "T023434", "product_identification_helper": { "cpe": "cpe:/a:apache:http_server:2.4.54" } } } ], "category": "product_name", "name": "HTTP Server" } ], "category": "vendor", "name": "Apache" }, { "branches": [ { "category": "product_name", "name": "Baramundi Management Suite", "product": { "name": "Baramundi Management Suite", "product_id": "T024720", "product_identification_helper": { "cpe": "cpe:/a:baramundi:management_suite:-" } } } ], "category": "vendor", "name": "Baramundi" }, { "branches": [ { "category": "product_name", "name": "Broadcom Brocade Switch", "product": { "name": "Broadcom Brocade Switch", "product_id": "T015844", "product_identification_helper": { "cpe": "cpe:/h:brocade:switch:-" } } } ], "category": "vendor", "name": "Broadcom" }, { "branches": [ { "branches": [ { "category": "product_name", "name": "F5 BIG-IP", "product": { "name": "F5 BIG-IP", "product_id": "T001663", "product_identification_helper": { "cpe": "cpe:/a:f5:big-ip:-" } } }, { "category": "product_version_range", "name": "\u003c 15.1.9", "product": { "name": "F5 BIG-IP \u003c 15.1.9", "product_id": "T028287", "product_identification_helper": { "cpe": "cpe:/a:f5:big-ip:15.1.9" } } } ], "category": "product_name", "name": "BIG-IP" } ], "category": "vendor", "name": "F5" }, { "branches": [ { "category": "product_name", "name": "Gentoo Linux", "product": { "name": "Gentoo Linux", "product_id": "T012167", "product_identification_helper": { "cpe": "cpe:/o:gentoo:linux:-" } } } ], "category": "vendor", "name": "Gentoo" }, { "branches": [ { "category": "product_name", "name": "HCL Commerce", "product": { "name": "HCL Commerce", "product_id": "T019293", "product_identification_helper": { "cpe": "cpe:/a:hcltechsw:commerce:-" } } } ], "category": "vendor", "name": "HCL" }, { "branches": [ { "category": "product_name", "name": "HPE Switch", "product": { "name": "HPE Switch", "product_id": "T005119", "product_identification_helper": { "cpe": "cpe:/h:hp:switch:-" } } } ], "category": "vendor", "name": "HPE" }, { "branches": [ { "branches": [ { "category": "product_version", "name": "8.5", "product": { "name": "IBM HTTP Server 8.5", "product_id": "T001650", "product_identification_helper": { "cpe": "cpe:/a:ibm:http_server:8.5" } } }, { "category": "product_version", "name": "7", "product": { "name": "IBM HTTP Server 7.0", "product_id": "T003674", "product_identification_helper": { "cpe": "cpe:/a:ibm:http_server:7.0" } } }, { "category": "product_version", "name": "8", "product": { "name": "IBM HTTP Server 8.0", "product_id": "T003675", "product_identification_helper": { "cpe": "cpe:/a:ibm:http_server:8.0" } } }, { "category": "product_name", "name": "IBM HTTP Server", "product": { "name": "IBM HTTP Server", "product_id": "T004019", "product_identification_helper": { "cpe": "cpe:/a:ibm:http_server:-" } } }, { "category": "product_version", "name": "9", "product": { "name": "IBM HTTP Server 9.0", "product_id": "T008162", "product_identification_helper": { "cpe": "cpe:/a:ibm:http_server:9.0" } } } ], "category": "product_name", "name": "HTTP Server" }, { "branches": [ { "category": "product_version_range", "name": "\u003c 7.5.0 UP8", "product": { "name": "IBM QRadar SIEM \u003c 7.5.0 UP8", "product_id": "T033681", "product_identification_helper": { "cpe": "cpe:/a:ibm:qradar_siem:7.5.0_up8" } } } ], "category": "product_name", "name": "QRadar SIEM" }, { "branches": [ { "category": "product_version_range", "name": "\u003c 8.0.0.24", "product": { "name": "IBM Rational Build Forge \u003c 8.0.0.24", "product_id": "T030689", "product_identification_helper": { "cpe": "cpe:/a:ibm:rational_build_forge:8.0.0.24" } } } ], "category": "product_name", "name": "Rational Build Forge" }, { "category": "product_name", "name": "IBM WebSphere Application Server", "product": { "name": "IBM WebSphere Application Server", "product_id": "5198", "product_identification_helper": { "cpe": "cpe:/a:ibm:websphere_application_server:-" } } } ], "category": "vendor", "name": "IBM" }, { "branches": [ { "category": "product_name", "name": "NetApp Data ONTAP", "product": { "name": "NetApp Data ONTAP", "product_id": "7654", "product_identification_helper": { "cpe": "cpe:/a:netapp:data_ontap:-" } } } ], "category": "vendor", "name": "NetApp" }, { "branches": [ { "category": "product_name", "name": "Oracle Linux", "product": { "name": "Oracle Linux", "product_id": "T004914", "product_identification_helper": { "cpe": "cpe:/o:oracle:linux:-" } } } ], "category": "vendor", "name": "Oracle" }, { "branches": [ { "category": "product_name", "name": "QNAP NAS", "product": { "name": "QNAP NAS", "product_id": "T017100", "product_identification_helper": { "cpe": "cpe:/h:qnap:nas:-" } } } ], "category": "vendor", "name": "QNAP" }, { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux", "product": { "name": "Red Hat Enterprise Linux", "product_id": "67646", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:-" } } } ], "category": "vendor", "name": "Red Hat" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux", "product": { "name": "SUSE Linux", "product_id": "T002207", "product_identification_helper": { "cpe": "cpe:/o:suse:suse_linux:-" } } } ], "category": "vendor", "name": "SUSE" }, { "branches": [ { "category": "product_name", "name": "Ubuntu Linux", "product": { "name": "Ubuntu Linux", "product_id": "T000126", "product_identification_helper": { "cpe": "cpe:/o:canonical:ubuntu_linux:-" } } } ], "category": "vendor", "name": "Ubuntu" } ] }, "vulnerabilities": [ { "cve": "CVE-2022-26377", "notes": [ { "category": "description", "text": "Es existiert eine Schwachstelle in Apache HTTP Server. Der Fehler besteht aufgrund einer unsachgem\u00e4\u00dfen Validierung von HTTP-Anfragen in mod_proxy_ajp. Ein entfernter, anonymer Angreifer kann diese Schwachstelle ausnutzen, um HTTP-Request-Schmuggel-Angriffe durchzuf\u00fchren. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich." } ], "product_status": { "known_affected": [ "5198", "T003674", "67646", "T003675", "7654", "T015844", "T030689", "T004019", "T005119", "T019293", "T033681", "T012167", "T004914", "T017100", "T002207", "T000126", "T001663", "398363", "T024720", "T001650", "T008162" ] }, "release_date": "2022-06-07T22:00:00Z", "title": "CVE-2022-26377" }, { "cve": "CVE-2022-28330", "notes": [ { "category": "description", "text": "In Apache HTTP Server existieren mehrere Schwachstellen. Die Fehler bestehen aufgrund mehrerer Out-of-Bounds-Reads. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um vertrauliche Informationen offenzulegen." } ], "product_status": { "known_affected": [ "5198", "T003674", "67646", "T003675", "7654", "T015844", "T030689", "T004019", "T005119", "T019293", "T033681", "T012167", "T004914", "T017100", "T002207", "T000126", "T001663", "398363", "T024720", "T001650", "T008162" ] }, "release_date": "2022-06-07T22:00:00Z", "title": "CVE-2022-28330" }, { "cve": "CVE-2022-28614", "notes": [ { "category": "description", "text": "In Apache HTTP Server existieren mehrere Schwachstellen. Die Fehler bestehen aufgrund mehrerer Out-of-Bounds-Reads. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um vertrauliche Informationen offenzulegen." } ], "product_status": { "known_affected": [ "5198", "T003674", "67646", "T003675", "7654", "T015844", "T030689", "T004019", "T005119", "T019293", "T033681", "T012167", "T004914", "T017100", "T002207", "T000126", "T001663", "398363", "T024720", "T001650", "T008162" ] }, "release_date": "2022-06-07T22:00:00Z", "title": "CVE-2022-28614" }, { "cve": "CVE-2022-28615", "notes": [ { "category": "description", "text": "In Apache HTTP Server existieren mehrere Schwachstellen. Die Fehler bestehen aufgrund mehrerer Out-of-Bounds-Reads. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um vertrauliche Informationen offenzulegen." } ], "product_status": { "known_affected": [ "5198", "T003674", "67646", "T003675", "7654", "T015844", "T030689", "T004019", "T005119", "T019293", "T033681", "T012167", "T004914", "T017100", "T002207", "T000126", "T001663", "398363", "T024720", "T001650", "T008162" ] }, "release_date": "2022-06-07T22:00:00Z", "title": "CVE-2022-28615" }, { "cve": "CVE-2022-30556", "notes": [ { "category": "description", "text": "In Apache HTTP Server existieren mehrere Schwachstellen. Die Fehler bestehen aufgrund mehrerer Out-of-Bounds-Reads. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um vertrauliche Informationen offenzulegen." } ], "product_status": { "known_affected": [ "5198", "T003674", "67646", "T003675", "7654", "T015844", "T030689", "T004019", "T005119", "T019293", "T033681", "T012167", "T004914", "T017100", "T002207", "T000126", "T001663", "398363", "T024720", "T001650", "T008162" ] }, "release_date": "2022-06-07T22:00:00Z", "title": "CVE-2022-30556" }, { "cve": "CVE-2022-29404", "notes": [ { "category": "description", "text": "In Apache HTTP Server existieren mehrere Schwachstellen. Die Fehler bestehen aufgrund eines Eingabevalidierungsfehlers und einer Ressourcenersch\u00f6pfung. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand zu verursachen." } ], "product_status": { "known_affected": [ "5198", "T003674", "67646", "T003675", "7654", "T015844", "T030689", "T004019", "T005119", "T019293", "T033681", "T012167", "T004914", "T017100", "T002207", "T000126", "T001663", "398363", "T024720", "T001650", "T008162" ] }, "release_date": "2022-06-07T22:00:00Z", "title": "CVE-2022-29404" }, { "cve": "CVE-2022-30522", "notes": [ { "category": "description", "text": "In Apache HTTP Server existieren mehrere Schwachstellen. Die Fehler bestehen aufgrund eines Eingabevalidierungsfehlers und einer Ressourcenersch\u00f6pfung. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand zu verursachen." } ], "product_status": { "known_affected": [ "5198", "T003674", "67646", "T003675", "7654", "T015844", "T030689", "T004019", "T005119", "T019293", "T033681", "T012167", "T004914", "T017100", "T002207", "T000126", "T001663", "398363", "T024720", "T001650", "T008162" ] }, "release_date": "2022-06-07T22:00:00Z", "title": "CVE-2022-30522" }, { "cve": "CVE-2022-31813", "notes": [ { "category": "description", "text": "Es existiert eine Schwachstelle in Apache HTTP Server. Der Fehler besteht aufgrund eines Fehlers in der mod_proxy-Implementierung, bei dem der Webserver m\u00f6glicherweise die X-Forwarded-*-Header nicht an den Ursprungsserver sendet, basierend auf dem clientseitigen Connection-Header-Hop-by-Hop-Mechanismus. Ein entfernter, anonymer Angreifer kann diese Schwachstelle ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen." } ], "product_status": { "known_affected": [ "5198", "T003674", "67646", "T003675", "7654", "T015844", "T030689", "T004019", "T005119", "T019293", "T033681", "T012167", "T004914", "T017100", "T002207", "T000126", "T001663", "398363", "T024720", "T001650", "T008162" ] }, "release_date": "2022-06-07T22:00:00Z", "title": "CVE-2022-31813" } ] }
gsd-2022-28614
Vulnerability from gsd
Modified
2023-12-13 01:19
Details
The ap_rwrite() function in Apache HTTP Server 2.4.53 and earlier may read unintended memory if an attacker can cause the server to reflect very large input using ap_rwrite() or ap_rputs(), such as with mod_luas r:puts() function. Modules compiled and distributed separately from Apache HTTP Server that use the 'ap_rputs' function and may pass it a very large (INT_MAX or larger) string must be compiled against current headers to resolve the issue.
Aliases
Aliases
{ "GSD": { "alias": "CVE-2022-28614", "description": "The ap_rwrite() function in Apache HTTP Server 2.4.53 and earlier may read unintended memory if an attacker can cause the server to reflect very large input using ap_rwrite() or ap_rputs(), such as with mod_luas r:puts() function.", "id": "GSD-2022-28614", "references": [ "https://security.archlinux.org/CVE-2022-28614", "https://www.suse.com/security/cve/CVE-2022-28614.html", "https://ubuntu.com/security/CVE-2022-28614", "https://alas.aws.amazon.com/cve/html/CVE-2022-28614.html", "https://access.redhat.com/errata/RHSA-2022:6753", "https://access.redhat.com/errata/RHSA-2022:7647", "https://access.redhat.com/errata/RHSA-2022:8067", "https://access.redhat.com/errata/RHSA-2022:8840", "https://access.redhat.com/errata/RHSA-2022:8841" ] }, "gsd": { "metadata": { "exploitCode": "unknown", "remediation": "unknown", "reportConfidence": "confirmed", "type": "vulnerability" }, "osvSchema": { "aliases": [ "CVE-2022-28614" ], "details": "The ap_rwrite() function in Apache HTTP Server 2.4.53 and earlier may read unintended memory if an attacker can cause the server to reflect very large input using ap_rwrite() or ap_rputs(), such as with mod_luas r:puts() function. Modules compiled and distributed separately from Apache HTTP Server that use the \u0027ap_rputs\u0027 function and may pass it a very large (INT_MAX or larger) string must be compiled against current headers to resolve the issue.", "id": "GSD-2022-28614", "modified": "2023-12-13T01:19:34.749430Z", "schema_version": "1.4.0" } }, "namespaces": { "cve.org": { "CVE_data_meta": { "ASSIGNER": "security@apache.org", "ID": "CVE-2022-28614", "STATE": "PUBLIC", "TITLE": "read beyond bounds via ap_rwrite() " }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Apache HTTP Server", "version": { "version_data": [ { "version_affected": "\u003c=", "version_value": "2.4.53" } ] } } ] }, "vendor_name": "Apache Software Foundation" } ] } }, "credit": [ { "lang": "eng", "value": "The Apache HTTP Server project would like to thank Ronald Crane (Zippenhop LLC) for reporting this issue" } ], "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The ap_rwrite() function in Apache HTTP Server 2.4.53 and earlier may read unintended memory if an attacker can cause the server to reflect very large input using ap_rwrite() or ap_rputs(), such as with mod_luas r:puts() function. Modules compiled and distributed separately from Apache HTTP Server that use the \u0027ap_rputs\u0027 function and may pass it a very large (INT_MAX or larger) string must be compiled against current headers to resolve the issue." } ] }, "generator": { "engine": "Vulnogram 0.0.9" }, "impact": [ { "other": "low" } ], "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-190 Integer Overflow or Wraparound" } ] }, { "description": [ { "lang": "eng", "value": "CWE-200 Exposure of Sensitive Information to an Unauthorized Actor" } ] } ] }, "references": { "reference_data": [ { "name": "https://httpd.apache.org/security/vulnerabilities_24.html", "refsource": "MISC", "url": "https://httpd.apache.org/security/vulnerabilities_24.html" }, { "name": "[oss-security] 20220608 CVE-2022-28614: Apache HTTP Server: read beyond bounds via ap_rwrite()", "refsource": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2022/06/08/4" }, { "name": "https://security.netapp.com/advisory/ntap-20220624-0005/", "refsource": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20220624-0005/" }, { "name": "FEDORA-2022-e620fb15d5", "refsource": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YPY2BLEVJWFH34AX77ZJPLD2OOBYR6ND/" }, { "name": "FEDORA-2022-b54a8dee29", "refsource": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7QUGG2QZWHTITMABFLVXA4DNYUOTPWYQ/" }, { "name": "GLSA-202208-20", "refsource": "GENTOO", "url": "https://security.gentoo.org/glsa/202208-20" } ] }, "source": { "discovery": "UNKNOWN" }, "timeline": [ { "lang": "eng", "time": "2022-06-08", "value": "released in 2.4.54" } ] }, "nvd.nist.gov": { "configurations": { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:apache:http_server:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "2.4.53", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:fedoraproject:fedora:36:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:netapp:clustered_data_ontap:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] }, "cve": { "CVE_data_meta": { "ASSIGNER": "security@apache.org", "ID": "CVE-2022-28614" }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "en", "value": "The ap_rwrite() function in Apache HTTP Server 2.4.53 and earlier may read unintended memory if an attacker can cause the server to reflect very large input using ap_rwrite() or ap_rputs(), such as with mod_luas r:puts() function. Modules compiled and distributed separately from Apache HTTP Server that use the \u0027ap_rputs\u0027 function and may pass it a very large (INT_MAX or larger) string must be compiled against current headers to resolve the issue." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "en", "value": "CWE-190" } ] } ] }, "references": { "reference_data": [ { "name": "[oss-security] 20220608 CVE-2022-28614: Apache HTTP Server: read beyond bounds via ap_rwrite()", "refsource": "MLIST", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://www.openwall.com/lists/oss-security/2022/06/08/4" }, { "name": "https://httpd.apache.org/security/vulnerabilities_24.html", "refsource": "MISC", "tags": [ "Vendor Advisory" ], "url": "https://httpd.apache.org/security/vulnerabilities_24.html" }, { "name": "https://security.netapp.com/advisory/ntap-20220624-0005/", "refsource": "CONFIRM", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20220624-0005/" }, { "name": "FEDORA-2022-e620fb15d5", "refsource": "FEDORA", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YPY2BLEVJWFH34AX77ZJPLD2OOBYR6ND/" }, { "name": "FEDORA-2022-b54a8dee29", "refsource": "FEDORA", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7QUGG2QZWHTITMABFLVXA4DNYUOTPWYQ/" }, { "name": "GLSA-202208-20", "refsource": "GENTOO", "tags": [ "Third Party Advisory" ], "url": "https://security.gentoo.org/glsa/202208-20" } ] } }, "impact": { "baseMetricV2": { "acInsufInfo": false, "cvssV2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "userInteractionRequired": false }, "baseMetricV3": { "cvssV3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 1.4 } }, "lastModifiedDate": "2022-08-24T18:25Z", "publishedDate": "2022-06-09T17:15Z" } } }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.