Action not permitted
Modal body text goes here.
cve-2017-12613
Vulnerability from cvelistv5
▼ | Vendor | Product |
---|---|---|
Apache Software Foundation | Apache Portable Runtime |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T18:43:56.151Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "[debian-lts-announce] 20171106 [SECURITY] [DLA 1162-1] apr security update", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.debian.org/debian-lts-announce/2017/11/msg00005.html" }, { "name": "RHSA-2018:0316", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2018:0316" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://svn.apache.org/viewvc?view=revision\u0026revision=1807976" }, { "name": "1042004", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1042004" }, { "name": "RHSA-2017:3475", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2017:3475" }, { "name": "RHSA-2018:0465", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2018:0465" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.apache.org/dist/apr/Announcement1.x.html" }, { "name": "RHSA-2017:3270", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2017:3270" }, { "name": "[announce] 20171023 Apache Portable Runtime APR 1.6.3, APR-util 1.6.1 and APR-iconv 1.2.2 Released", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.apache.org/thread.html/12489f2e4a9f9d390235c16298aca0d20658789de80d553513977f13%40%3Cannounce.apache.org%3E" }, { "name": "RHSA-2017:3476", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2017:3476" }, { "name": "RHSA-2018:1253", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2018:1253" }, { "name": "RHSA-2017:3477", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2017:3477" }, { "name": "RHSA-2018:0466", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2018:0466" }, { "name": "101560", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/101560" }, { "name": "[apr-commits] 20210816 svn commit: r1892358 - /apr/apr/branches/1.7.x/CHANGES", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.apache.org/thread.html/rcc48a0acebbd74bbdeebc02ff228bb72c0631b21823fffe27d4691e9%40%3Ccommits.apr.apache.org%3E" }, { "name": "[apr-commits] 20210820 svn commit: r49582 - /release/apr/patches/apr-1.7.0-CVE-2021-35940.patch", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.apache.org/thread.html/r270dd5022db194b78acaf509216a33c85f3da43757defa05cc766339%40%3Ccommits.apr.apache.org%3E" }, { "name": "[apr-dev] 20210823 CVE-2021-35940: Apache Portable Runtime (APR): Regression of CVE-2017-12613", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.apache.org/thread.html/ra2868b53339a6af65577146ad87016368c138388b09bff9d2860f50e%40%3Cdev.apr.apache.org%3E" }, { "name": "[oss-security] 20210823 CVE-2021-35940: Apache Portable Runtime (APR): Regression of CVE-2017-12613", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2021/08/23/1" }, { "name": "[announce] 20210823 CVE-2021-35940: Apache Portable Runtime (APR): Regression of CVE-2017-12613", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.apache.org/thread.html/rb1f3c85f50fbd924a0051675118d1609e57957a02ece7facb723155b%40%3Cannounce.apache.org%3E" }, { "name": "[apr-dev] 20210916 Re: CVE-2021-35940: Apache Portable Runtime (APR): Regression of CVE-2017-12613", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.apache.org/thread.html/ra38094406cc38a05218ebd1158187feda021b0c3a1df400bbf296af8%40%3Cdev.apr.apache.org%3E" }, { "name": "[debian-lts-announce] 20220124 [SECURITY] [DLA 2897-1] apr security update", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.debian.org/debian-lts-announce/2022/01/msg00023.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Apache Portable Runtime", "vendor": "Apache Software Foundation", "versions": [ { "status": "affected", "version": "1.6.2 and prior" } ] } ], "datePublic": "2017-10-23T00:00:00", "descriptions": [ { "lang": "en", "value": "When apr_time_exp*() or apr_os_exp_time*() functions are invoked with an invalid month field value in Apache Portable Runtime APR 1.6.2 and prior, out of bounds memory may be accessed in converting this value to an apr_time_exp_t value, potentially revealing the contents of a different static heap value or resulting in program termination, and may represent an information disclosure or denial of service vulnerability to applications which call these APR functions with unvalidated external input." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-01-25T01:06:07", "orgId": "f0158376-9dc2-43b6-827c-5f631a4d8d09", "shortName": "apache" }, "references": [ { "name": "[debian-lts-announce] 20171106 [SECURITY] [DLA 1162-1] apr security update", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.debian.org/debian-lts-announce/2017/11/msg00005.html" }, { "name": "RHSA-2018:0316", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2018:0316" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://svn.apache.org/viewvc?view=revision\u0026revision=1807976" }, { "name": "1042004", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1042004" }, { "name": "RHSA-2017:3475", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2017:3475" }, { "name": "RHSA-2018:0465", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2018:0465" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.apache.org/dist/apr/Announcement1.x.html" }, { "name": "RHSA-2017:3270", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2017:3270" }, { "name": "[announce] 20171023 Apache Portable Runtime APR 1.6.3, APR-util 1.6.1 and APR-iconv 1.2.2 Released", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.apache.org/thread.html/12489f2e4a9f9d390235c16298aca0d20658789de80d553513977f13%40%3Cannounce.apache.org%3E" }, { "name": "RHSA-2017:3476", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2017:3476" }, { "name": "RHSA-2018:1253", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2018:1253" }, { "name": "RHSA-2017:3477", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2017:3477" }, { "name": "RHSA-2018:0466", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2018:0466" }, { "name": "101560", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/101560" }, { "name": "[apr-commits] 20210816 svn commit: r1892358 - /apr/apr/branches/1.7.x/CHANGES", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.apache.org/thread.html/rcc48a0acebbd74bbdeebc02ff228bb72c0631b21823fffe27d4691e9%40%3Ccommits.apr.apache.org%3E" }, { "name": "[apr-commits] 20210820 svn commit: r49582 - /release/apr/patches/apr-1.7.0-CVE-2021-35940.patch", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.apache.org/thread.html/r270dd5022db194b78acaf509216a33c85f3da43757defa05cc766339%40%3Ccommits.apr.apache.org%3E" }, { "name": "[apr-dev] 20210823 CVE-2021-35940: Apache Portable Runtime (APR): Regression of CVE-2017-12613", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.apache.org/thread.html/ra2868b53339a6af65577146ad87016368c138388b09bff9d2860f50e%40%3Cdev.apr.apache.org%3E" }, { "name": "[oss-security] 20210823 CVE-2021-35940: Apache Portable Runtime (APR): Regression of CVE-2017-12613", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openwall.com/lists/oss-security/2021/08/23/1" }, { "name": "[announce] 20210823 CVE-2021-35940: Apache Portable Runtime (APR): Regression of CVE-2017-12613", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.apache.org/thread.html/rb1f3c85f50fbd924a0051675118d1609e57957a02ece7facb723155b%40%3Cannounce.apache.org%3E" }, { "name": "[apr-dev] 20210916 Re: CVE-2021-35940: Apache Portable Runtime (APR): Regression of CVE-2017-12613", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.apache.org/thread.html/ra38094406cc38a05218ebd1158187feda021b0c3a1df400bbf296af8%40%3Cdev.apr.apache.org%3E" }, { "name": "[debian-lts-announce] 20220124 [SECURITY] [DLA 2897-1] apr security update", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.debian.org/debian-lts-announce/2022/01/msg00023.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@apache.org", "ID": "CVE-2017-12613", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Apache Portable Runtime", "version": { "version_data": [ { "version_value": "1.6.2 and prior" } ] } } ] }, "vendor_name": "Apache Software Foundation" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "When apr_time_exp*() or apr_os_exp_time*() functions are invoked with an invalid month field value in Apache Portable Runtime APR 1.6.2 and prior, out of bounds memory may be accessed in converting this value to an apr_time_exp_t value, potentially revealing the contents of a different static heap value or resulting in program termination, and may represent an information disclosure or denial of service vulnerability to applications which call these APR functions with unvalidated external input." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "[debian-lts-announce] 20171106 [SECURITY] [DLA 1162-1] apr security update", "refsource": "MLIST", "url": "https://lists.debian.org/debian-lts-announce/2017/11/msg00005.html" }, { "name": "RHSA-2018:0316", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2018:0316" }, { "name": "https://svn.apache.org/viewvc?view=revision\u0026revision=1807976", "refsource": "CONFIRM", "url": "https://svn.apache.org/viewvc?view=revision\u0026revision=1807976" }, { "name": "1042004", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1042004" }, { "name": "RHSA-2017:3475", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2017:3475" }, { "name": "RHSA-2018:0465", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2018:0465" }, { "name": "http://www.apache.org/dist/apr/Announcement1.x.html", "refsource": "CONFIRM", "url": "http://www.apache.org/dist/apr/Announcement1.x.html" }, { "name": "RHSA-2017:3270", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2017:3270" }, { "name": "[announce] 20171023 Apache Portable Runtime APR 1.6.3, APR-util 1.6.1 and APR-iconv 1.2.2 Released", "refsource": "MLIST", "url": "https://lists.apache.org/thread.html/12489f2e4a9f9d390235c16298aca0d20658789de80d553513977f13%40%3Cannounce.apache.org%3E" }, { "name": "RHSA-2017:3476", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2017:3476" }, { "name": "RHSA-2018:1253", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2018:1253" }, { "name": "RHSA-2017:3477", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2017:3477" }, { "name": "RHSA-2018:0466", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2018:0466" }, { "name": "101560", "refsource": "BID", "url": "http://www.securityfocus.com/bid/101560" }, { "name": "[apr-commits] 20210816 svn commit: r1892358 - /apr/apr/branches/1.7.x/CHANGES", "refsource": "MLIST", "url": "https://lists.apache.org/thread.html/rcc48a0acebbd74bbdeebc02ff228bb72c0631b21823fffe27d4691e9@%3Ccommits.apr.apache.org%3E" }, { "name": "[apr-commits] 20210820 svn commit: r49582 - /release/apr/patches/apr-1.7.0-CVE-2021-35940.patch", "refsource": "MLIST", "url": "https://lists.apache.org/thread.html/r270dd5022db194b78acaf509216a33c85f3da43757defa05cc766339@%3Ccommits.apr.apache.org%3E" }, { "name": "[apr-dev] 20210823 CVE-2021-35940: Apache Portable Runtime (APR): Regression of CVE-2017-12613", "refsource": "MLIST", "url": "https://lists.apache.org/thread.html/ra2868b53339a6af65577146ad87016368c138388b09bff9d2860f50e@%3Cdev.apr.apache.org%3E" }, { "name": "[oss-security] 20210823 CVE-2021-35940: Apache Portable Runtime (APR): Regression of CVE-2017-12613", "refsource": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2021/08/23/1" }, { "name": "[announce] 20210823 CVE-2021-35940: Apache Portable Runtime (APR): Regression of CVE-2017-12613", "refsource": "MLIST", "url": "https://lists.apache.org/thread.html/rb1f3c85f50fbd924a0051675118d1609e57957a02ece7facb723155b@%3Cannounce.apache.org%3E" }, { "name": "[apr-dev] 20210916 Re: CVE-2021-35940: Apache Portable Runtime (APR): Regression of CVE-2017-12613", "refsource": "MLIST", "url": "https://lists.apache.org/thread.html/ra38094406cc38a05218ebd1158187feda021b0c3a1df400bbf296af8@%3Cdev.apr.apache.org%3E" }, { "name": "[debian-lts-announce] 20220124 [SECURITY] [DLA 2897-1] apr security update", "refsource": "MLIST", "url": "https://lists.debian.org/debian-lts-announce/2022/01/msg00023.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "f0158376-9dc2-43b6-827c-5f631a4d8d09", "assignerShortName": "apache", "cveId": "CVE-2017-12613", "datePublished": "2017-10-24T01:00:00", "dateReserved": "2017-08-07T00:00:00", "dateUpdated": "2024-08-05T18:43:56.151Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2017-12613\",\"sourceIdentifier\":\"security@apache.org\",\"published\":\"2017-10-24T01:29:02.000\",\"lastModified\":\"2023-11-07T02:38:26.083\",\"vulnStatus\":\"Modified\",\"descriptions\":[{\"lang\":\"en\",\"value\":\"When apr_time_exp*() or apr_os_exp_time*() functions are invoked with an invalid month field value in Apache Portable Runtime APR 1.6.2 and prior, out of bounds memory may be accessed in converting this value to an apr_time_exp_t value, potentially revealing the contents of a different static heap value or resulting in program termination, and may represent an information disclosure or denial of service vulnerability to applications which call these APR functions with unvalidated external input.\"},{\"lang\":\"es\",\"value\":\"Cuando las funciones apr_time_exp*() o apr_os_exp_time*() se invocan con un valor del campo no v\u00e1lido en Apache Portable Runtime APR 1.6.2 y anteriores, se podr\u00eda acceder a la memoria fuera de l\u00edmites convirtiendo este valor en un valor apr_time_exp_t, revelando potencialmente el contenido de otro valor de memoria din\u00e1mica est\u00e1tica. Tambi\u00e9n podr\u00eda desembocar en la terminaci\u00f3n del programa, representando una vulnerabilidad de divulgaci\u00f3n de informaci\u00f3n o de denegaci\u00f3n de servicio en aplicaciones que llaman a esas funciones APR con entradas externas no validadas.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"HIGH\",\"baseScore\":7.1,\"baseSeverity\":\"HIGH\"},\"exploitabilityScore\":1.8,\"impactScore\":5.2}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:L/AC:L/Au:N/C:P/I:N/A:P\",\"accessVector\":\"LOCAL\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"PARTIAL\",\"baseScore\":3.6},\"baseSeverity\":\"LOW\",\"exploitabilityScore\":3.9,\"impactScore\":4.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-125\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:portable_runtime:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"1.7.0\",\"matchCriteriaId\":\"7C450F13-ADED-49A6-A018-EF2EDD2ECF36\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"16F59A04-14CF-49E2-9973-645477EA09DA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DEECE5FC-CACF-4496-A3E7-164736409252\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redhat:jboss_core_services:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9B453CF7-9AA6-4B94-A003-BF7AE0B82F53\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redhat:jboss_core_services:1.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A2466282-51AB-478D-9FF4-FA524265ED2E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redhat:jboss_enterprise_web_server:3.0.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8E2F2F98-DB90-43F6-8F28-3656207B6188\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redhat:software_collections:1.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9D7EE4B6-A6EC-4B9B-91DF-79615796673F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EE249E1B-A1FD-4E08-AA71-A0E1F10FFE97\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"33C068A4-3780-4EAB-A937-6082DF847564\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_eus:6.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"967EC28A-607F-48F4-AD64-5E3041C768F0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_eus:7.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"807C024A-F8E8-4B48-A349-4C68CD252CA1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F96E3779-F56A-45FF-BB3D-4980527D721E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0CF73560-2F5B-4723-A8A1-9AADBB3ADA00\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5BF3C7A5-9117-42C7-BEA1-4AA378A582EF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"83737173-E12E-4641-BC49-0BD84A6B29D0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9BBCD86A-E6C7-4444-9D74-F861084090F0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"51EF4996-72F4-4FA4-814F-F5991E7A8318\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_server_aus:6.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AF83BB87-B203-48F9-9D06-48A5FE399050\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_server_aus:6.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1F3BEFDB-5156-4E1C-80BB-8BE9FEAA7623\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_server_aus:6.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"16E6D998-B41D-4B49-9E00-8336D2E40A4A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_server_aus:7.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1C8D871B-AEA1-4407-AEE3-47EC782250FF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"98381E61-F082-4302-B51F-5648884F998B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D99A687E-EAE6-417E-A88E-D0082BC194CD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B353CE99-D57C-465B-AAB0-73EF581127D1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7431ABC1-9252-419E-8CC1-311B41360078\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_server_tus:6.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"13E02156-E748-4820-B76F-7074793837E1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_server_tus:7.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6755B6AD-0422-467B-8115-34A60B1D1A40\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"24C0F4E1-C52C-41E0-9F14-F83ADD5CC7ED\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_server_tus:7.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D5F7E11E-FB34-4467-8919-2B6BEAABF665\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B76AA310-FEC7-497F-AF04-C3EC1E76C4CC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"17F256A9-D3B9-4C72-B013-4EFD878BFEA8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E5ED5807-55B7-47C5-97A6-03233F4FBC3A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"825ECE2D-E232-46E0-A047-074B34DB1E97\"}]}]}],\"references\":[{\"url\":\"http://www.apache.org/dist/apr/Announcement1.x.html\",\"source\":\"security@apache.org\",\"tags\":[\"Release Notes\",\"Vendor Advisory\"]},{\"url\":\"http://www.openwall.com/lists/oss-security/2021/08/23/1\",\"source\":\"security@apache.org\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://www.securityfocus.com/bid/101560\",\"source\":\"security@apache.org\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://www.securitytracker.com/id/1042004\",\"source\":\"security@apache.org\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2017:3270\",\"source\":\"security@apache.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2017:3475\",\"source\":\"security@apache.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2017:3476\",\"source\":\"security@apache.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2017:3477\",\"source\":\"security@apache.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2018:0316\",\"source\":\"security@apache.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2018:0465\",\"source\":\"security@apache.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2018:0466\",\"source\":\"security@apache.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2018:1253\",\"source\":\"security@apache.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://lists.apache.org/thread.html/12489f2e4a9f9d390235c16298aca0d20658789de80d553513977f13%40%3Cannounce.apache.org%3E\",\"source\":\"security@apache.org\",\"tags\":[\"Issue Tracking\",\"Vendor Advisory\"]},{\"url\":\"https://lists.apache.org/thread.html/r270dd5022db194b78acaf509216a33c85f3da43757defa05cc766339%40%3Ccommits.apr.apache.org%3E\",\"source\":\"security@apache.org\"},{\"url\":\"https://lists.apache.org/thread.html/ra2868b53339a6af65577146ad87016368c138388b09bff9d2860f50e%40%3Cdev.apr.apache.org%3E\",\"source\":\"security@apache.org\"},{\"url\":\"https://lists.apache.org/thread.html/ra38094406cc38a05218ebd1158187feda021b0c3a1df400bbf296af8%40%3Cdev.apr.apache.org%3E\",\"source\":\"security@apache.org\"},{\"url\":\"https://lists.apache.org/thread.html/rb1f3c85f50fbd924a0051675118d1609e57957a02ece7facb723155b%40%3Cannounce.apache.org%3E\",\"source\":\"security@apache.org\"},{\"url\":\"https://lists.apache.org/thread.html/rcc48a0acebbd74bbdeebc02ff228bb72c0631b21823fffe27d4691e9%40%3Ccommits.apr.apache.org%3E\",\"source\":\"security@apache.org\"},{\"url\":\"https://lists.debian.org/debian-lts-announce/2017/11/msg00005.html\",\"source\":\"security@apache.org\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://lists.debian.org/debian-lts-announce/2022/01/msg00023.html\",\"source\":\"security@apache.org\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://svn.apache.org/viewvc?view=revision\u0026revision=1807976\",\"source\":\"security@apache.org\",\"tags\":[\"Issue Tracking\",\"Third Party Advisory\"]}]}}" } }
rhsa-2017_3270
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for apr is now available for Red Hat Enterprise Linux 6 and Red Hat Enterprise Linux 7.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "The Apache Portable Runtime (APR) is a portability library used by the Apache HTTP Server and other projects. It provides a free library of C data structures and routines.\n\nSecurity Fix(es):\n\n* An out-of-bounds array dereference was found in apr_time_exp_get(). An attacker could abuse an unvalidated usage of this function to cause a denial of service or potentially lead to data leak. (CVE-2017-12613)", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2017:3270", "url": "https://access.redhat.com/errata/RHSA-2017:3270" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "1506523", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1506523" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2017/rhsa-2017_3270.json" } ], "title": "Red Hat Security Advisory: apr security update", "tracking": { "current_release_date": "2024-11-14T21:46:23+00:00", "generator": { "date": "2024-11-14T21:46:23+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2017:3270", "initial_release_date": "2017-11-28T22:42:31+00:00", "revision_history": [ { "date": "2017-11-28T22:42:31+00:00", "number": "1", "summary": "Initial version" }, { "date": "2017-11-28T22:42:31+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-14T21:46:23+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux Desktop (v. 6)", "product": { "name": "Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.9.z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::client" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Desktop Optional (v. 6)", "product": { "name": "Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.9.z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::client" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux HPC Node (v. 6)", "product": { "name": "Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.9.z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::computenode" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product": { "name": "Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.9.z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::computenode" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server (v. 6)", "product": { "name": "Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.9.z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Workstation (v. 6)", "product": { "name": "Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.9.z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::workstation" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Client (v. 7)", "product": { "name": "Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.4.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::client" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Client Optional (v. 7)", "product": { "name": "Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.4.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::client" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product": { "name": "Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.4.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::computenode" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server (v. 7)", "product": { "name": "Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.4.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product": { "name": "Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.4.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Workstation (v. 7)", "product": { "name": "Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.4.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::workstation" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "apr-debuginfo-0:1.3.9-5.el6_9.1.x86_64", "product": { "name": "apr-debuginfo-0:1.3.9-5.el6_9.1.x86_64", "product_id": "apr-debuginfo-0:1.3.9-5.el6_9.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/apr-debuginfo@1.3.9-5.el6_9.1?arch=x86_64" } } }, { "category": "product_version", "name": "apr-0:1.3.9-5.el6_9.1.x86_64", "product": { "name": "apr-0:1.3.9-5.el6_9.1.x86_64", "product_id": "apr-0:1.3.9-5.el6_9.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/apr@1.3.9-5.el6_9.1?arch=x86_64" } } }, { "category": "product_version", "name": "apr-devel-0:1.3.9-5.el6_9.1.x86_64", "product": { "name": "apr-devel-0:1.3.9-5.el6_9.1.x86_64", "product_id": "apr-devel-0:1.3.9-5.el6_9.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/apr-devel@1.3.9-5.el6_9.1?arch=x86_64" } } }, { "category": "product_version", "name": "apr-0:1.4.8-3.el7_4.1.x86_64", "product": { "name": "apr-0:1.4.8-3.el7_4.1.x86_64", "product_id": "apr-0:1.4.8-3.el7_4.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/apr@1.4.8-3.el7_4.1?arch=x86_64" } } }, { "category": "product_version", "name": "apr-debuginfo-0:1.4.8-3.el7_4.1.x86_64", "product": { "name": "apr-debuginfo-0:1.4.8-3.el7_4.1.x86_64", "product_id": "apr-debuginfo-0:1.4.8-3.el7_4.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/apr-debuginfo@1.4.8-3.el7_4.1?arch=x86_64" } } }, { "category": "product_version", "name": "apr-devel-0:1.4.8-3.el7_4.1.x86_64", "product": { "name": "apr-devel-0:1.4.8-3.el7_4.1.x86_64", "product_id": "apr-devel-0:1.4.8-3.el7_4.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/apr-devel@1.4.8-3.el7_4.1?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "apr-debuginfo-0:1.3.9-5.el6_9.1.i686", "product": { "name": "apr-debuginfo-0:1.3.9-5.el6_9.1.i686", "product_id": "apr-debuginfo-0:1.3.9-5.el6_9.1.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/apr-debuginfo@1.3.9-5.el6_9.1?arch=i686" } } }, { "category": "product_version", "name": "apr-0:1.3.9-5.el6_9.1.i686", "product": { "name": "apr-0:1.3.9-5.el6_9.1.i686", "product_id": "apr-0:1.3.9-5.el6_9.1.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/apr@1.3.9-5.el6_9.1?arch=i686" } } }, { "category": "product_version", "name": "apr-devel-0:1.3.9-5.el6_9.1.i686", "product": { "name": "apr-devel-0:1.3.9-5.el6_9.1.i686", "product_id": "apr-devel-0:1.3.9-5.el6_9.1.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/apr-devel@1.3.9-5.el6_9.1?arch=i686" } } }, { "category": "product_version", "name": "apr-0:1.4.8-3.el7_4.1.i686", "product": { "name": "apr-0:1.4.8-3.el7_4.1.i686", "product_id": "apr-0:1.4.8-3.el7_4.1.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/apr@1.4.8-3.el7_4.1?arch=i686" } } }, { "category": "product_version", "name": "apr-debuginfo-0:1.4.8-3.el7_4.1.i686", "product": { "name": "apr-debuginfo-0:1.4.8-3.el7_4.1.i686", "product_id": "apr-debuginfo-0:1.4.8-3.el7_4.1.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/apr-debuginfo@1.4.8-3.el7_4.1?arch=i686" } } }, { "category": "product_version", "name": "apr-devel-0:1.4.8-3.el7_4.1.i686", "product": { "name": "apr-devel-0:1.4.8-3.el7_4.1.i686", "product_id": "apr-devel-0:1.4.8-3.el7_4.1.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/apr-devel@1.4.8-3.el7_4.1?arch=i686" } } } ], "category": "architecture", "name": "i686" }, { "branches": [ { "category": "product_version", "name": "apr-0:1.3.9-5.el6_9.1.src", "product": { "name": "apr-0:1.3.9-5.el6_9.1.src", "product_id": "apr-0:1.3.9-5.el6_9.1.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/apr@1.3.9-5.el6_9.1?arch=src" } } }, { "category": "product_version", "name": "apr-0:1.4.8-3.el7_4.1.src", "product": { "name": "apr-0:1.4.8-3.el7_4.1.src", "product_id": "apr-0:1.4.8-3.el7_4.1.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/apr@1.4.8-3.el7_4.1?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "apr-debuginfo-0:1.3.9-5.el6_9.1.ppc", "product": { "name": "apr-debuginfo-0:1.3.9-5.el6_9.1.ppc", "product_id": "apr-debuginfo-0:1.3.9-5.el6_9.1.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/apr-debuginfo@1.3.9-5.el6_9.1?arch=ppc" } } }, { "category": "product_version", "name": "apr-devel-0:1.3.9-5.el6_9.1.ppc", "product": { "name": "apr-devel-0:1.3.9-5.el6_9.1.ppc", "product_id": "apr-devel-0:1.3.9-5.el6_9.1.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/apr-devel@1.3.9-5.el6_9.1?arch=ppc" } } }, { "category": "product_version", "name": "apr-0:1.3.9-5.el6_9.1.ppc", "product": { "name": "apr-0:1.3.9-5.el6_9.1.ppc", "product_id": "apr-0:1.3.9-5.el6_9.1.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/apr@1.3.9-5.el6_9.1?arch=ppc" } } }, { "category": "product_version", "name": "apr-0:1.4.8-3.el7_4.1.ppc", "product": { "name": "apr-0:1.4.8-3.el7_4.1.ppc", "product_id": "apr-0:1.4.8-3.el7_4.1.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/apr@1.4.8-3.el7_4.1?arch=ppc" } } }, { "category": "product_version", "name": "apr-debuginfo-0:1.4.8-3.el7_4.1.ppc", "product": { "name": "apr-debuginfo-0:1.4.8-3.el7_4.1.ppc", "product_id": "apr-debuginfo-0:1.4.8-3.el7_4.1.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/apr-debuginfo@1.4.8-3.el7_4.1?arch=ppc" } } }, { "category": "product_version", "name": "apr-devel-0:1.4.8-3.el7_4.1.ppc", "product": { "name": "apr-devel-0:1.4.8-3.el7_4.1.ppc", "product_id": "apr-devel-0:1.4.8-3.el7_4.1.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/apr-devel@1.4.8-3.el7_4.1?arch=ppc" } } } ], "category": "architecture", "name": "ppc" }, { "branches": [ { "category": "product_version", "name": "apr-debuginfo-0:1.3.9-5.el6_9.1.ppc64", "product": { "name": "apr-debuginfo-0:1.3.9-5.el6_9.1.ppc64", "product_id": "apr-debuginfo-0:1.3.9-5.el6_9.1.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/apr-debuginfo@1.3.9-5.el6_9.1?arch=ppc64" } } }, { "category": "product_version", "name": "apr-devel-0:1.3.9-5.el6_9.1.ppc64", "product": { "name": "apr-devel-0:1.3.9-5.el6_9.1.ppc64", "product_id": "apr-devel-0:1.3.9-5.el6_9.1.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/apr-devel@1.3.9-5.el6_9.1?arch=ppc64" } } }, { "category": "product_version", "name": "apr-0:1.3.9-5.el6_9.1.ppc64", "product": { "name": "apr-0:1.3.9-5.el6_9.1.ppc64", "product_id": "apr-0:1.3.9-5.el6_9.1.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/apr@1.3.9-5.el6_9.1?arch=ppc64" } } }, { "category": "product_version", "name": "apr-0:1.4.8-3.el7_4.1.ppc64", "product": { "name": "apr-0:1.4.8-3.el7_4.1.ppc64", "product_id": "apr-0:1.4.8-3.el7_4.1.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/apr@1.4.8-3.el7_4.1?arch=ppc64" } } }, { "category": "product_version", "name": "apr-debuginfo-0:1.4.8-3.el7_4.1.ppc64", "product": { "name": "apr-debuginfo-0:1.4.8-3.el7_4.1.ppc64", "product_id": "apr-debuginfo-0:1.4.8-3.el7_4.1.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/apr-debuginfo@1.4.8-3.el7_4.1?arch=ppc64" } } }, { "category": "product_version", "name": "apr-devel-0:1.4.8-3.el7_4.1.ppc64", "product": { "name": "apr-devel-0:1.4.8-3.el7_4.1.ppc64", "product_id": "apr-devel-0:1.4.8-3.el7_4.1.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/apr-devel@1.4.8-3.el7_4.1?arch=ppc64" } } } ], "category": "architecture", "name": "ppc64" }, { "branches": [ { "category": "product_version", "name": "apr-debuginfo-0:1.3.9-5.el6_9.1.s390", "product": { "name": "apr-debuginfo-0:1.3.9-5.el6_9.1.s390", "product_id": "apr-debuginfo-0:1.3.9-5.el6_9.1.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/apr-debuginfo@1.3.9-5.el6_9.1?arch=s390" } } }, { "category": "product_version", "name": "apr-devel-0:1.3.9-5.el6_9.1.s390", "product": { "name": "apr-devel-0:1.3.9-5.el6_9.1.s390", "product_id": "apr-devel-0:1.3.9-5.el6_9.1.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/apr-devel@1.3.9-5.el6_9.1?arch=s390" } } }, { "category": "product_version", "name": "apr-0:1.3.9-5.el6_9.1.s390", "product": { "name": "apr-0:1.3.9-5.el6_9.1.s390", "product_id": "apr-0:1.3.9-5.el6_9.1.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/apr@1.3.9-5.el6_9.1?arch=s390" } } }, { "category": "product_version", "name": "apr-0:1.4.8-3.el7_4.1.s390", "product": { "name": "apr-0:1.4.8-3.el7_4.1.s390", "product_id": "apr-0:1.4.8-3.el7_4.1.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/apr@1.4.8-3.el7_4.1?arch=s390" } } }, { "category": "product_version", "name": "apr-debuginfo-0:1.4.8-3.el7_4.1.s390", "product": { "name": "apr-debuginfo-0:1.4.8-3.el7_4.1.s390", "product_id": "apr-debuginfo-0:1.4.8-3.el7_4.1.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/apr-debuginfo@1.4.8-3.el7_4.1?arch=s390" } } }, { "category": "product_version", "name": "apr-devel-0:1.4.8-3.el7_4.1.s390", "product": { "name": "apr-devel-0:1.4.8-3.el7_4.1.s390", "product_id": "apr-devel-0:1.4.8-3.el7_4.1.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/apr-devel@1.4.8-3.el7_4.1?arch=s390" } } } ], "category": "architecture", "name": "s390" }, { "branches": [ { "category": "product_version", "name": "apr-debuginfo-0:1.3.9-5.el6_9.1.s390x", "product": { "name": "apr-debuginfo-0:1.3.9-5.el6_9.1.s390x", "product_id": "apr-debuginfo-0:1.3.9-5.el6_9.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/apr-debuginfo@1.3.9-5.el6_9.1?arch=s390x" } } }, { "category": "product_version", "name": "apr-devel-0:1.3.9-5.el6_9.1.s390x", "product": { "name": "apr-devel-0:1.3.9-5.el6_9.1.s390x", "product_id": "apr-devel-0:1.3.9-5.el6_9.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/apr-devel@1.3.9-5.el6_9.1?arch=s390x" } } }, { "category": "product_version", "name": "apr-0:1.3.9-5.el6_9.1.s390x", "product": { "name": "apr-0:1.3.9-5.el6_9.1.s390x", "product_id": "apr-0:1.3.9-5.el6_9.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/apr@1.3.9-5.el6_9.1?arch=s390x" } } }, { "category": "product_version", "name": "apr-0:1.4.8-3.el7_4.1.s390x", "product": { "name": "apr-0:1.4.8-3.el7_4.1.s390x", "product_id": "apr-0:1.4.8-3.el7_4.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/apr@1.4.8-3.el7_4.1?arch=s390x" } } }, { "category": "product_version", "name": "apr-debuginfo-0:1.4.8-3.el7_4.1.s390x", "product": { "name": "apr-debuginfo-0:1.4.8-3.el7_4.1.s390x", "product_id": "apr-debuginfo-0:1.4.8-3.el7_4.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/apr-debuginfo@1.4.8-3.el7_4.1?arch=s390x" } } }, { "category": "product_version", "name": "apr-devel-0:1.4.8-3.el7_4.1.s390x", "product": { "name": "apr-devel-0:1.4.8-3.el7_4.1.s390x", "product_id": "apr-devel-0:1.4.8-3.el7_4.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/apr-devel@1.4.8-3.el7_4.1?arch=s390x" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "apr-0:1.4.8-3.el7_4.1.ppc64le", "product": { "name": "apr-0:1.4.8-3.el7_4.1.ppc64le", "product_id": "apr-0:1.4.8-3.el7_4.1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/apr@1.4.8-3.el7_4.1?arch=ppc64le" } } }, { "category": "product_version", "name": "apr-debuginfo-0:1.4.8-3.el7_4.1.ppc64le", "product": { "name": "apr-debuginfo-0:1.4.8-3.el7_4.1.ppc64le", "product_id": "apr-debuginfo-0:1.4.8-3.el7_4.1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/apr-debuginfo@1.4.8-3.el7_4.1?arch=ppc64le" } } }, { "category": "product_version", "name": "apr-devel-0:1.4.8-3.el7_4.1.ppc64le", "product": { "name": "apr-devel-0:1.4.8-3.el7_4.1.ppc64le", "product_id": "apr-devel-0:1.4.8-3.el7_4.1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/apr-devel@1.4.8-3.el7_4.1?arch=ppc64le" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "apr-0:1.4.8-3.el7_4.1.aarch64", "product": { "name": "apr-0:1.4.8-3.el7_4.1.aarch64", "product_id": "apr-0:1.4.8-3.el7_4.1.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/apr@1.4.8-3.el7_4.1?arch=aarch64" } } }, { "category": "product_version", "name": "apr-debuginfo-0:1.4.8-3.el7_4.1.aarch64", "product": { "name": "apr-debuginfo-0:1.4.8-3.el7_4.1.aarch64", "product_id": "apr-debuginfo-0:1.4.8-3.el7_4.1.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/apr-debuginfo@1.4.8-3.el7_4.1?arch=aarch64" } } }, { "category": "product_version", "name": "apr-devel-0:1.4.8-3.el7_4.1.aarch64", "product": { "name": "apr-devel-0:1.4.8-3.el7_4.1.aarch64", "product_id": "apr-devel-0:1.4.8-3.el7_4.1.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/apr-devel@1.4.8-3.el7_4.1?arch=aarch64" } } } ], "category": "architecture", "name": "aarch64" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "apr-0:1.3.9-5.el6_9.1.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.9.z:apr-0:1.3.9-5.el6_9.1.i686" }, "product_reference": "apr-0:1.3.9-5.el6_9.1.i686", "relates_to_product_reference": "6Client-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "apr-0:1.3.9-5.el6_9.1.ppc as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.9.z:apr-0:1.3.9-5.el6_9.1.ppc" }, "product_reference": "apr-0:1.3.9-5.el6_9.1.ppc", "relates_to_product_reference": "6Client-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "apr-0:1.3.9-5.el6_9.1.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.9.z:apr-0:1.3.9-5.el6_9.1.ppc64" }, "product_reference": "apr-0:1.3.9-5.el6_9.1.ppc64", "relates_to_product_reference": "6Client-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "apr-0:1.3.9-5.el6_9.1.s390 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.9.z:apr-0:1.3.9-5.el6_9.1.s390" }, "product_reference": "apr-0:1.3.9-5.el6_9.1.s390", "relates_to_product_reference": "6Client-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "apr-0:1.3.9-5.el6_9.1.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.9.z:apr-0:1.3.9-5.el6_9.1.s390x" }, "product_reference": "apr-0:1.3.9-5.el6_9.1.s390x", "relates_to_product_reference": "6Client-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "apr-0:1.3.9-5.el6_9.1.src as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.9.z:apr-0:1.3.9-5.el6_9.1.src" }, "product_reference": "apr-0:1.3.9-5.el6_9.1.src", "relates_to_product_reference": "6Client-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "apr-0:1.3.9-5.el6_9.1.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.9.z:apr-0:1.3.9-5.el6_9.1.x86_64" }, "product_reference": "apr-0:1.3.9-5.el6_9.1.x86_64", "relates_to_product_reference": "6Client-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "apr-debuginfo-0:1.3.9-5.el6_9.1.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.9.z:apr-debuginfo-0:1.3.9-5.el6_9.1.i686" }, "product_reference": "apr-debuginfo-0:1.3.9-5.el6_9.1.i686", "relates_to_product_reference": "6Client-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "apr-debuginfo-0:1.3.9-5.el6_9.1.ppc as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.9.z:apr-debuginfo-0:1.3.9-5.el6_9.1.ppc" }, "product_reference": "apr-debuginfo-0:1.3.9-5.el6_9.1.ppc", "relates_to_product_reference": "6Client-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "apr-debuginfo-0:1.3.9-5.el6_9.1.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.9.z:apr-debuginfo-0:1.3.9-5.el6_9.1.ppc64" }, "product_reference": "apr-debuginfo-0:1.3.9-5.el6_9.1.ppc64", "relates_to_product_reference": "6Client-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "apr-debuginfo-0:1.3.9-5.el6_9.1.s390 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.9.z:apr-debuginfo-0:1.3.9-5.el6_9.1.s390" }, "product_reference": "apr-debuginfo-0:1.3.9-5.el6_9.1.s390", "relates_to_product_reference": "6Client-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "apr-debuginfo-0:1.3.9-5.el6_9.1.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.9.z:apr-debuginfo-0:1.3.9-5.el6_9.1.s390x" }, "product_reference": "apr-debuginfo-0:1.3.9-5.el6_9.1.s390x", "relates_to_product_reference": "6Client-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "apr-debuginfo-0:1.3.9-5.el6_9.1.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.9.z:apr-debuginfo-0:1.3.9-5.el6_9.1.x86_64" }, "product_reference": "apr-debuginfo-0:1.3.9-5.el6_9.1.x86_64", "relates_to_product_reference": "6Client-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "apr-devel-0:1.3.9-5.el6_9.1.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.9.z:apr-devel-0:1.3.9-5.el6_9.1.i686" }, "product_reference": "apr-devel-0:1.3.9-5.el6_9.1.i686", "relates_to_product_reference": "6Client-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "apr-devel-0:1.3.9-5.el6_9.1.ppc as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.9.z:apr-devel-0:1.3.9-5.el6_9.1.ppc" }, "product_reference": "apr-devel-0:1.3.9-5.el6_9.1.ppc", "relates_to_product_reference": "6Client-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "apr-devel-0:1.3.9-5.el6_9.1.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.9.z:apr-devel-0:1.3.9-5.el6_9.1.ppc64" }, "product_reference": "apr-devel-0:1.3.9-5.el6_9.1.ppc64", "relates_to_product_reference": "6Client-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "apr-devel-0:1.3.9-5.el6_9.1.s390 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.9.z:apr-devel-0:1.3.9-5.el6_9.1.s390" }, "product_reference": "apr-devel-0:1.3.9-5.el6_9.1.s390", "relates_to_product_reference": "6Client-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "apr-devel-0:1.3.9-5.el6_9.1.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.9.z:apr-devel-0:1.3.9-5.el6_9.1.s390x" }, "product_reference": "apr-devel-0:1.3.9-5.el6_9.1.s390x", "relates_to_product_reference": "6Client-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "apr-devel-0:1.3.9-5.el6_9.1.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.9.z:apr-devel-0:1.3.9-5.el6_9.1.x86_64" }, "product_reference": "apr-devel-0:1.3.9-5.el6_9.1.x86_64", "relates_to_product_reference": "6Client-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "apr-0:1.3.9-5.el6_9.1.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.9.z:apr-0:1.3.9-5.el6_9.1.i686" }, "product_reference": "apr-0:1.3.9-5.el6_9.1.i686", "relates_to_product_reference": "6Client-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "apr-0:1.3.9-5.el6_9.1.ppc as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.9.z:apr-0:1.3.9-5.el6_9.1.ppc" }, "product_reference": "apr-0:1.3.9-5.el6_9.1.ppc", "relates_to_product_reference": "6Client-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "apr-0:1.3.9-5.el6_9.1.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.9.z:apr-0:1.3.9-5.el6_9.1.ppc64" }, "product_reference": "apr-0:1.3.9-5.el6_9.1.ppc64", "relates_to_product_reference": "6Client-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "apr-0:1.3.9-5.el6_9.1.s390 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.9.z:apr-0:1.3.9-5.el6_9.1.s390" }, "product_reference": "apr-0:1.3.9-5.el6_9.1.s390", "relates_to_product_reference": "6Client-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "apr-0:1.3.9-5.el6_9.1.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.9.z:apr-0:1.3.9-5.el6_9.1.s390x" }, "product_reference": "apr-0:1.3.9-5.el6_9.1.s390x", "relates_to_product_reference": "6Client-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "apr-0:1.3.9-5.el6_9.1.src as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.9.z:apr-0:1.3.9-5.el6_9.1.src" }, "product_reference": "apr-0:1.3.9-5.el6_9.1.src", "relates_to_product_reference": "6Client-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "apr-0:1.3.9-5.el6_9.1.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.9.z:apr-0:1.3.9-5.el6_9.1.x86_64" }, "product_reference": "apr-0:1.3.9-5.el6_9.1.x86_64", "relates_to_product_reference": "6Client-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "apr-debuginfo-0:1.3.9-5.el6_9.1.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.9.z:apr-debuginfo-0:1.3.9-5.el6_9.1.i686" }, "product_reference": "apr-debuginfo-0:1.3.9-5.el6_9.1.i686", "relates_to_product_reference": "6Client-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "apr-debuginfo-0:1.3.9-5.el6_9.1.ppc as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.9.z:apr-debuginfo-0:1.3.9-5.el6_9.1.ppc" }, "product_reference": "apr-debuginfo-0:1.3.9-5.el6_9.1.ppc", "relates_to_product_reference": "6Client-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "apr-debuginfo-0:1.3.9-5.el6_9.1.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.9.z:apr-debuginfo-0:1.3.9-5.el6_9.1.ppc64" }, "product_reference": "apr-debuginfo-0:1.3.9-5.el6_9.1.ppc64", "relates_to_product_reference": "6Client-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "apr-debuginfo-0:1.3.9-5.el6_9.1.s390 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.9.z:apr-debuginfo-0:1.3.9-5.el6_9.1.s390" }, "product_reference": "apr-debuginfo-0:1.3.9-5.el6_9.1.s390", "relates_to_product_reference": "6Client-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "apr-debuginfo-0:1.3.9-5.el6_9.1.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.9.z:apr-debuginfo-0:1.3.9-5.el6_9.1.s390x" }, "product_reference": "apr-debuginfo-0:1.3.9-5.el6_9.1.s390x", "relates_to_product_reference": "6Client-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "apr-debuginfo-0:1.3.9-5.el6_9.1.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.9.z:apr-debuginfo-0:1.3.9-5.el6_9.1.x86_64" }, "product_reference": "apr-debuginfo-0:1.3.9-5.el6_9.1.x86_64", "relates_to_product_reference": "6Client-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "apr-devel-0:1.3.9-5.el6_9.1.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.9.z:apr-devel-0:1.3.9-5.el6_9.1.i686" }, "product_reference": "apr-devel-0:1.3.9-5.el6_9.1.i686", "relates_to_product_reference": "6Client-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "apr-devel-0:1.3.9-5.el6_9.1.ppc as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.9.z:apr-devel-0:1.3.9-5.el6_9.1.ppc" }, "product_reference": "apr-devel-0:1.3.9-5.el6_9.1.ppc", "relates_to_product_reference": "6Client-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "apr-devel-0:1.3.9-5.el6_9.1.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.9.z:apr-devel-0:1.3.9-5.el6_9.1.ppc64" }, "product_reference": "apr-devel-0:1.3.9-5.el6_9.1.ppc64", "relates_to_product_reference": "6Client-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "apr-devel-0:1.3.9-5.el6_9.1.s390 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.9.z:apr-devel-0:1.3.9-5.el6_9.1.s390" }, "product_reference": "apr-devel-0:1.3.9-5.el6_9.1.s390", "relates_to_product_reference": "6Client-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "apr-devel-0:1.3.9-5.el6_9.1.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.9.z:apr-devel-0:1.3.9-5.el6_9.1.s390x" }, "product_reference": "apr-devel-0:1.3.9-5.el6_9.1.s390x", "relates_to_product_reference": "6Client-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "apr-devel-0:1.3.9-5.el6_9.1.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.9.z:apr-devel-0:1.3.9-5.el6_9.1.x86_64" }, "product_reference": "apr-devel-0:1.3.9-5.el6_9.1.x86_64", "relates_to_product_reference": "6Client-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "apr-0:1.3.9-5.el6_9.1.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.9.z:apr-0:1.3.9-5.el6_9.1.i686" }, "product_reference": "apr-0:1.3.9-5.el6_9.1.i686", "relates_to_product_reference": "6ComputeNode-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "apr-0:1.3.9-5.el6_9.1.ppc as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.9.z:apr-0:1.3.9-5.el6_9.1.ppc" }, "product_reference": "apr-0:1.3.9-5.el6_9.1.ppc", "relates_to_product_reference": "6ComputeNode-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "apr-0:1.3.9-5.el6_9.1.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.9.z:apr-0:1.3.9-5.el6_9.1.ppc64" }, "product_reference": "apr-0:1.3.9-5.el6_9.1.ppc64", "relates_to_product_reference": "6ComputeNode-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "apr-0:1.3.9-5.el6_9.1.s390 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.9.z:apr-0:1.3.9-5.el6_9.1.s390" }, "product_reference": "apr-0:1.3.9-5.el6_9.1.s390", "relates_to_product_reference": "6ComputeNode-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "apr-0:1.3.9-5.el6_9.1.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.9.z:apr-0:1.3.9-5.el6_9.1.s390x" }, "product_reference": "apr-0:1.3.9-5.el6_9.1.s390x", "relates_to_product_reference": "6ComputeNode-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "apr-0:1.3.9-5.el6_9.1.src as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.9.z:apr-0:1.3.9-5.el6_9.1.src" }, "product_reference": "apr-0:1.3.9-5.el6_9.1.src", "relates_to_product_reference": "6ComputeNode-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "apr-0:1.3.9-5.el6_9.1.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.9.z:apr-0:1.3.9-5.el6_9.1.x86_64" }, "product_reference": "apr-0:1.3.9-5.el6_9.1.x86_64", "relates_to_product_reference": "6ComputeNode-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "apr-debuginfo-0:1.3.9-5.el6_9.1.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.9.z:apr-debuginfo-0:1.3.9-5.el6_9.1.i686" }, "product_reference": "apr-debuginfo-0:1.3.9-5.el6_9.1.i686", "relates_to_product_reference": "6ComputeNode-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "apr-debuginfo-0:1.3.9-5.el6_9.1.ppc as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.9.z:apr-debuginfo-0:1.3.9-5.el6_9.1.ppc" }, "product_reference": "apr-debuginfo-0:1.3.9-5.el6_9.1.ppc", "relates_to_product_reference": "6ComputeNode-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "apr-debuginfo-0:1.3.9-5.el6_9.1.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.9.z:apr-debuginfo-0:1.3.9-5.el6_9.1.ppc64" }, "product_reference": "apr-debuginfo-0:1.3.9-5.el6_9.1.ppc64", "relates_to_product_reference": "6ComputeNode-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "apr-debuginfo-0:1.3.9-5.el6_9.1.s390 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.9.z:apr-debuginfo-0:1.3.9-5.el6_9.1.s390" }, "product_reference": "apr-debuginfo-0:1.3.9-5.el6_9.1.s390", "relates_to_product_reference": "6ComputeNode-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "apr-debuginfo-0:1.3.9-5.el6_9.1.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.9.z:apr-debuginfo-0:1.3.9-5.el6_9.1.s390x" }, "product_reference": "apr-debuginfo-0:1.3.9-5.el6_9.1.s390x", "relates_to_product_reference": "6ComputeNode-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "apr-debuginfo-0:1.3.9-5.el6_9.1.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.9.z:apr-debuginfo-0:1.3.9-5.el6_9.1.x86_64" }, "product_reference": "apr-debuginfo-0:1.3.9-5.el6_9.1.x86_64", "relates_to_product_reference": "6ComputeNode-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "apr-devel-0:1.3.9-5.el6_9.1.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.9.z:apr-devel-0:1.3.9-5.el6_9.1.i686" }, "product_reference": "apr-devel-0:1.3.9-5.el6_9.1.i686", "relates_to_product_reference": "6ComputeNode-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "apr-devel-0:1.3.9-5.el6_9.1.ppc as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.9.z:apr-devel-0:1.3.9-5.el6_9.1.ppc" }, "product_reference": "apr-devel-0:1.3.9-5.el6_9.1.ppc", "relates_to_product_reference": "6ComputeNode-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "apr-devel-0:1.3.9-5.el6_9.1.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.9.z:apr-devel-0:1.3.9-5.el6_9.1.ppc64" }, "product_reference": "apr-devel-0:1.3.9-5.el6_9.1.ppc64", "relates_to_product_reference": "6ComputeNode-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "apr-devel-0:1.3.9-5.el6_9.1.s390 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.9.z:apr-devel-0:1.3.9-5.el6_9.1.s390" }, "product_reference": "apr-devel-0:1.3.9-5.el6_9.1.s390", "relates_to_product_reference": "6ComputeNode-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "apr-devel-0:1.3.9-5.el6_9.1.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.9.z:apr-devel-0:1.3.9-5.el6_9.1.s390x" }, "product_reference": "apr-devel-0:1.3.9-5.el6_9.1.s390x", "relates_to_product_reference": "6ComputeNode-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "apr-devel-0:1.3.9-5.el6_9.1.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.9.z:apr-devel-0:1.3.9-5.el6_9.1.x86_64" }, "product_reference": "apr-devel-0:1.3.9-5.el6_9.1.x86_64", "relates_to_product_reference": "6ComputeNode-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "apr-0:1.3.9-5.el6_9.1.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.9.z:apr-0:1.3.9-5.el6_9.1.i686" }, "product_reference": "apr-0:1.3.9-5.el6_9.1.i686", "relates_to_product_reference": "6ComputeNode-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "apr-0:1.3.9-5.el6_9.1.ppc as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.9.z:apr-0:1.3.9-5.el6_9.1.ppc" }, "product_reference": "apr-0:1.3.9-5.el6_9.1.ppc", "relates_to_product_reference": "6ComputeNode-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "apr-0:1.3.9-5.el6_9.1.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.9.z:apr-0:1.3.9-5.el6_9.1.ppc64" }, "product_reference": "apr-0:1.3.9-5.el6_9.1.ppc64", "relates_to_product_reference": "6ComputeNode-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "apr-0:1.3.9-5.el6_9.1.s390 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.9.z:apr-0:1.3.9-5.el6_9.1.s390" }, "product_reference": "apr-0:1.3.9-5.el6_9.1.s390", "relates_to_product_reference": "6ComputeNode-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "apr-0:1.3.9-5.el6_9.1.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.9.z:apr-0:1.3.9-5.el6_9.1.s390x" }, "product_reference": "apr-0:1.3.9-5.el6_9.1.s390x", "relates_to_product_reference": "6ComputeNode-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "apr-0:1.3.9-5.el6_9.1.src as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.9.z:apr-0:1.3.9-5.el6_9.1.src" }, "product_reference": "apr-0:1.3.9-5.el6_9.1.src", "relates_to_product_reference": "6ComputeNode-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "apr-0:1.3.9-5.el6_9.1.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.9.z:apr-0:1.3.9-5.el6_9.1.x86_64" }, "product_reference": "apr-0:1.3.9-5.el6_9.1.x86_64", "relates_to_product_reference": "6ComputeNode-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "apr-debuginfo-0:1.3.9-5.el6_9.1.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.9.z:apr-debuginfo-0:1.3.9-5.el6_9.1.i686" }, "product_reference": "apr-debuginfo-0:1.3.9-5.el6_9.1.i686", "relates_to_product_reference": "6ComputeNode-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "apr-debuginfo-0:1.3.9-5.el6_9.1.ppc as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.9.z:apr-debuginfo-0:1.3.9-5.el6_9.1.ppc" }, "product_reference": "apr-debuginfo-0:1.3.9-5.el6_9.1.ppc", "relates_to_product_reference": "6ComputeNode-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "apr-debuginfo-0:1.3.9-5.el6_9.1.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.9.z:apr-debuginfo-0:1.3.9-5.el6_9.1.ppc64" }, "product_reference": "apr-debuginfo-0:1.3.9-5.el6_9.1.ppc64", "relates_to_product_reference": "6ComputeNode-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "apr-debuginfo-0:1.3.9-5.el6_9.1.s390 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.9.z:apr-debuginfo-0:1.3.9-5.el6_9.1.s390" }, "product_reference": "apr-debuginfo-0:1.3.9-5.el6_9.1.s390", "relates_to_product_reference": "6ComputeNode-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "apr-debuginfo-0:1.3.9-5.el6_9.1.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.9.z:apr-debuginfo-0:1.3.9-5.el6_9.1.s390x" }, "product_reference": "apr-debuginfo-0:1.3.9-5.el6_9.1.s390x", "relates_to_product_reference": "6ComputeNode-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "apr-debuginfo-0:1.3.9-5.el6_9.1.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.9.z:apr-debuginfo-0:1.3.9-5.el6_9.1.x86_64" }, "product_reference": "apr-debuginfo-0:1.3.9-5.el6_9.1.x86_64", "relates_to_product_reference": "6ComputeNode-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "apr-devel-0:1.3.9-5.el6_9.1.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.9.z:apr-devel-0:1.3.9-5.el6_9.1.i686" }, "product_reference": "apr-devel-0:1.3.9-5.el6_9.1.i686", "relates_to_product_reference": "6ComputeNode-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "apr-devel-0:1.3.9-5.el6_9.1.ppc as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.9.z:apr-devel-0:1.3.9-5.el6_9.1.ppc" }, "product_reference": "apr-devel-0:1.3.9-5.el6_9.1.ppc", "relates_to_product_reference": "6ComputeNode-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "apr-devel-0:1.3.9-5.el6_9.1.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.9.z:apr-devel-0:1.3.9-5.el6_9.1.ppc64" }, "product_reference": "apr-devel-0:1.3.9-5.el6_9.1.ppc64", "relates_to_product_reference": "6ComputeNode-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "apr-devel-0:1.3.9-5.el6_9.1.s390 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.9.z:apr-devel-0:1.3.9-5.el6_9.1.s390" }, "product_reference": "apr-devel-0:1.3.9-5.el6_9.1.s390", "relates_to_product_reference": "6ComputeNode-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "apr-devel-0:1.3.9-5.el6_9.1.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.9.z:apr-devel-0:1.3.9-5.el6_9.1.s390x" }, "product_reference": "apr-devel-0:1.3.9-5.el6_9.1.s390x", "relates_to_product_reference": "6ComputeNode-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "apr-devel-0:1.3.9-5.el6_9.1.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.9.z:apr-devel-0:1.3.9-5.el6_9.1.x86_64" }, "product_reference": "apr-devel-0:1.3.9-5.el6_9.1.x86_64", "relates_to_product_reference": "6ComputeNode-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "apr-0:1.3.9-5.el6_9.1.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.9.z:apr-0:1.3.9-5.el6_9.1.i686" }, "product_reference": "apr-0:1.3.9-5.el6_9.1.i686", "relates_to_product_reference": "6Server-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "apr-0:1.3.9-5.el6_9.1.ppc as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.9.z:apr-0:1.3.9-5.el6_9.1.ppc" }, "product_reference": "apr-0:1.3.9-5.el6_9.1.ppc", "relates_to_product_reference": "6Server-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "apr-0:1.3.9-5.el6_9.1.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.9.z:apr-0:1.3.9-5.el6_9.1.ppc64" }, "product_reference": "apr-0:1.3.9-5.el6_9.1.ppc64", "relates_to_product_reference": "6Server-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "apr-0:1.3.9-5.el6_9.1.s390 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.9.z:apr-0:1.3.9-5.el6_9.1.s390" }, "product_reference": "apr-0:1.3.9-5.el6_9.1.s390", "relates_to_product_reference": "6Server-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "apr-0:1.3.9-5.el6_9.1.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.9.z:apr-0:1.3.9-5.el6_9.1.s390x" }, "product_reference": "apr-0:1.3.9-5.el6_9.1.s390x", "relates_to_product_reference": "6Server-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "apr-0:1.3.9-5.el6_9.1.src as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.9.z:apr-0:1.3.9-5.el6_9.1.src" }, "product_reference": "apr-0:1.3.9-5.el6_9.1.src", "relates_to_product_reference": "6Server-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "apr-0:1.3.9-5.el6_9.1.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.9.z:apr-0:1.3.9-5.el6_9.1.x86_64" }, "product_reference": "apr-0:1.3.9-5.el6_9.1.x86_64", "relates_to_product_reference": "6Server-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "apr-debuginfo-0:1.3.9-5.el6_9.1.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.9.z:apr-debuginfo-0:1.3.9-5.el6_9.1.i686" }, "product_reference": "apr-debuginfo-0:1.3.9-5.el6_9.1.i686", "relates_to_product_reference": "6Server-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "apr-debuginfo-0:1.3.9-5.el6_9.1.ppc as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.9.z:apr-debuginfo-0:1.3.9-5.el6_9.1.ppc" }, "product_reference": "apr-debuginfo-0:1.3.9-5.el6_9.1.ppc", "relates_to_product_reference": "6Server-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "apr-debuginfo-0:1.3.9-5.el6_9.1.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.9.z:apr-debuginfo-0:1.3.9-5.el6_9.1.ppc64" }, "product_reference": "apr-debuginfo-0:1.3.9-5.el6_9.1.ppc64", "relates_to_product_reference": "6Server-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "apr-debuginfo-0:1.3.9-5.el6_9.1.s390 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.9.z:apr-debuginfo-0:1.3.9-5.el6_9.1.s390" }, "product_reference": "apr-debuginfo-0:1.3.9-5.el6_9.1.s390", "relates_to_product_reference": "6Server-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "apr-debuginfo-0:1.3.9-5.el6_9.1.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.9.z:apr-debuginfo-0:1.3.9-5.el6_9.1.s390x" }, "product_reference": "apr-debuginfo-0:1.3.9-5.el6_9.1.s390x", "relates_to_product_reference": "6Server-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "apr-debuginfo-0:1.3.9-5.el6_9.1.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.9.z:apr-debuginfo-0:1.3.9-5.el6_9.1.x86_64" }, "product_reference": "apr-debuginfo-0:1.3.9-5.el6_9.1.x86_64", "relates_to_product_reference": "6Server-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "apr-devel-0:1.3.9-5.el6_9.1.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.9.z:apr-devel-0:1.3.9-5.el6_9.1.i686" }, "product_reference": "apr-devel-0:1.3.9-5.el6_9.1.i686", "relates_to_product_reference": "6Server-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "apr-devel-0:1.3.9-5.el6_9.1.ppc as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.9.z:apr-devel-0:1.3.9-5.el6_9.1.ppc" }, "product_reference": "apr-devel-0:1.3.9-5.el6_9.1.ppc", "relates_to_product_reference": "6Server-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "apr-devel-0:1.3.9-5.el6_9.1.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.9.z:apr-devel-0:1.3.9-5.el6_9.1.ppc64" }, "product_reference": "apr-devel-0:1.3.9-5.el6_9.1.ppc64", "relates_to_product_reference": "6Server-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "apr-devel-0:1.3.9-5.el6_9.1.s390 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.9.z:apr-devel-0:1.3.9-5.el6_9.1.s390" }, "product_reference": "apr-devel-0:1.3.9-5.el6_9.1.s390", "relates_to_product_reference": "6Server-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "apr-devel-0:1.3.9-5.el6_9.1.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.9.z:apr-devel-0:1.3.9-5.el6_9.1.s390x" }, "product_reference": "apr-devel-0:1.3.9-5.el6_9.1.s390x", "relates_to_product_reference": "6Server-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "apr-devel-0:1.3.9-5.el6_9.1.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.9.z:apr-devel-0:1.3.9-5.el6_9.1.x86_64" }, "product_reference": "apr-devel-0:1.3.9-5.el6_9.1.x86_64", "relates_to_product_reference": "6Server-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "apr-0:1.3.9-5.el6_9.1.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.9.z:apr-0:1.3.9-5.el6_9.1.i686" }, "product_reference": "apr-0:1.3.9-5.el6_9.1.i686", "relates_to_product_reference": "6Workstation-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "apr-0:1.3.9-5.el6_9.1.ppc as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.9.z:apr-0:1.3.9-5.el6_9.1.ppc" }, "product_reference": "apr-0:1.3.9-5.el6_9.1.ppc", "relates_to_product_reference": "6Workstation-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "apr-0:1.3.9-5.el6_9.1.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.9.z:apr-0:1.3.9-5.el6_9.1.ppc64" }, "product_reference": "apr-0:1.3.9-5.el6_9.1.ppc64", "relates_to_product_reference": "6Workstation-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "apr-0:1.3.9-5.el6_9.1.s390 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.9.z:apr-0:1.3.9-5.el6_9.1.s390" }, "product_reference": "apr-0:1.3.9-5.el6_9.1.s390", "relates_to_product_reference": "6Workstation-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "apr-0:1.3.9-5.el6_9.1.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.9.z:apr-0:1.3.9-5.el6_9.1.s390x" }, "product_reference": "apr-0:1.3.9-5.el6_9.1.s390x", "relates_to_product_reference": "6Workstation-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "apr-0:1.3.9-5.el6_9.1.src as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.9.z:apr-0:1.3.9-5.el6_9.1.src" }, "product_reference": "apr-0:1.3.9-5.el6_9.1.src", "relates_to_product_reference": "6Workstation-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "apr-0:1.3.9-5.el6_9.1.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.9.z:apr-0:1.3.9-5.el6_9.1.x86_64" }, "product_reference": "apr-0:1.3.9-5.el6_9.1.x86_64", "relates_to_product_reference": "6Workstation-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "apr-debuginfo-0:1.3.9-5.el6_9.1.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.9.z:apr-debuginfo-0:1.3.9-5.el6_9.1.i686" }, "product_reference": "apr-debuginfo-0:1.3.9-5.el6_9.1.i686", "relates_to_product_reference": "6Workstation-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "apr-debuginfo-0:1.3.9-5.el6_9.1.ppc as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.9.z:apr-debuginfo-0:1.3.9-5.el6_9.1.ppc" }, "product_reference": "apr-debuginfo-0:1.3.9-5.el6_9.1.ppc", "relates_to_product_reference": "6Workstation-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "apr-debuginfo-0:1.3.9-5.el6_9.1.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.9.z:apr-debuginfo-0:1.3.9-5.el6_9.1.ppc64" }, "product_reference": "apr-debuginfo-0:1.3.9-5.el6_9.1.ppc64", "relates_to_product_reference": "6Workstation-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "apr-debuginfo-0:1.3.9-5.el6_9.1.s390 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.9.z:apr-debuginfo-0:1.3.9-5.el6_9.1.s390" }, "product_reference": "apr-debuginfo-0:1.3.9-5.el6_9.1.s390", "relates_to_product_reference": "6Workstation-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "apr-debuginfo-0:1.3.9-5.el6_9.1.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.9.z:apr-debuginfo-0:1.3.9-5.el6_9.1.s390x" }, "product_reference": "apr-debuginfo-0:1.3.9-5.el6_9.1.s390x", "relates_to_product_reference": "6Workstation-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "apr-debuginfo-0:1.3.9-5.el6_9.1.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.9.z:apr-debuginfo-0:1.3.9-5.el6_9.1.x86_64" }, "product_reference": "apr-debuginfo-0:1.3.9-5.el6_9.1.x86_64", "relates_to_product_reference": "6Workstation-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "apr-devel-0:1.3.9-5.el6_9.1.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.9.z:apr-devel-0:1.3.9-5.el6_9.1.i686" }, "product_reference": "apr-devel-0:1.3.9-5.el6_9.1.i686", "relates_to_product_reference": "6Workstation-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "apr-devel-0:1.3.9-5.el6_9.1.ppc as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.9.z:apr-devel-0:1.3.9-5.el6_9.1.ppc" }, "product_reference": "apr-devel-0:1.3.9-5.el6_9.1.ppc", "relates_to_product_reference": "6Workstation-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "apr-devel-0:1.3.9-5.el6_9.1.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.9.z:apr-devel-0:1.3.9-5.el6_9.1.ppc64" }, "product_reference": "apr-devel-0:1.3.9-5.el6_9.1.ppc64", "relates_to_product_reference": "6Workstation-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "apr-devel-0:1.3.9-5.el6_9.1.s390 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.9.z:apr-devel-0:1.3.9-5.el6_9.1.s390" }, "product_reference": "apr-devel-0:1.3.9-5.el6_9.1.s390", "relates_to_product_reference": "6Workstation-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "apr-devel-0:1.3.9-5.el6_9.1.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.9.z:apr-devel-0:1.3.9-5.el6_9.1.s390x" }, "product_reference": "apr-devel-0:1.3.9-5.el6_9.1.s390x", "relates_to_product_reference": "6Workstation-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "apr-devel-0:1.3.9-5.el6_9.1.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.9.z:apr-devel-0:1.3.9-5.el6_9.1.x86_64" }, "product_reference": "apr-devel-0:1.3.9-5.el6_9.1.x86_64", "relates_to_product_reference": "6Workstation-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "apr-0:1.4.8-3.el7_4.1.aarch64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.4.Z:apr-0:1.4.8-3.el7_4.1.aarch64" }, "product_reference": "apr-0:1.4.8-3.el7_4.1.aarch64", "relates_to_product_reference": "7Client-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "apr-0:1.4.8-3.el7_4.1.i686 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.4.Z:apr-0:1.4.8-3.el7_4.1.i686" }, "product_reference": "apr-0:1.4.8-3.el7_4.1.i686", "relates_to_product_reference": "7Client-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "apr-0:1.4.8-3.el7_4.1.ppc as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.4.Z:apr-0:1.4.8-3.el7_4.1.ppc" }, "product_reference": "apr-0:1.4.8-3.el7_4.1.ppc", "relates_to_product_reference": "7Client-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "apr-0:1.4.8-3.el7_4.1.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.4.Z:apr-0:1.4.8-3.el7_4.1.ppc64" }, "product_reference": "apr-0:1.4.8-3.el7_4.1.ppc64", "relates_to_product_reference": "7Client-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "apr-0:1.4.8-3.el7_4.1.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.4.Z:apr-0:1.4.8-3.el7_4.1.ppc64le" }, "product_reference": "apr-0:1.4.8-3.el7_4.1.ppc64le", "relates_to_product_reference": "7Client-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "apr-0:1.4.8-3.el7_4.1.s390 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.4.Z:apr-0:1.4.8-3.el7_4.1.s390" }, "product_reference": "apr-0:1.4.8-3.el7_4.1.s390", "relates_to_product_reference": "7Client-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "apr-0:1.4.8-3.el7_4.1.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.4.Z:apr-0:1.4.8-3.el7_4.1.s390x" }, "product_reference": "apr-0:1.4.8-3.el7_4.1.s390x", "relates_to_product_reference": "7Client-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "apr-0:1.4.8-3.el7_4.1.src as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.4.Z:apr-0:1.4.8-3.el7_4.1.src" }, "product_reference": "apr-0:1.4.8-3.el7_4.1.src", "relates_to_product_reference": "7Client-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "apr-0:1.4.8-3.el7_4.1.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.4.Z:apr-0:1.4.8-3.el7_4.1.x86_64" }, "product_reference": "apr-0:1.4.8-3.el7_4.1.x86_64", "relates_to_product_reference": "7Client-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "apr-debuginfo-0:1.4.8-3.el7_4.1.aarch64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.4.Z:apr-debuginfo-0:1.4.8-3.el7_4.1.aarch64" }, "product_reference": "apr-debuginfo-0:1.4.8-3.el7_4.1.aarch64", "relates_to_product_reference": "7Client-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "apr-debuginfo-0:1.4.8-3.el7_4.1.i686 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.4.Z:apr-debuginfo-0:1.4.8-3.el7_4.1.i686" }, "product_reference": "apr-debuginfo-0:1.4.8-3.el7_4.1.i686", "relates_to_product_reference": "7Client-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "apr-debuginfo-0:1.4.8-3.el7_4.1.ppc as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.4.Z:apr-debuginfo-0:1.4.8-3.el7_4.1.ppc" }, "product_reference": "apr-debuginfo-0:1.4.8-3.el7_4.1.ppc", "relates_to_product_reference": "7Client-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "apr-debuginfo-0:1.4.8-3.el7_4.1.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.4.Z:apr-debuginfo-0:1.4.8-3.el7_4.1.ppc64" }, "product_reference": "apr-debuginfo-0:1.4.8-3.el7_4.1.ppc64", "relates_to_product_reference": "7Client-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "apr-debuginfo-0:1.4.8-3.el7_4.1.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.4.Z:apr-debuginfo-0:1.4.8-3.el7_4.1.ppc64le" }, "product_reference": "apr-debuginfo-0:1.4.8-3.el7_4.1.ppc64le", "relates_to_product_reference": "7Client-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "apr-debuginfo-0:1.4.8-3.el7_4.1.s390 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.4.Z:apr-debuginfo-0:1.4.8-3.el7_4.1.s390" }, "product_reference": "apr-debuginfo-0:1.4.8-3.el7_4.1.s390", "relates_to_product_reference": "7Client-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "apr-debuginfo-0:1.4.8-3.el7_4.1.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.4.Z:apr-debuginfo-0:1.4.8-3.el7_4.1.s390x" }, "product_reference": "apr-debuginfo-0:1.4.8-3.el7_4.1.s390x", "relates_to_product_reference": "7Client-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "apr-debuginfo-0:1.4.8-3.el7_4.1.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.4.Z:apr-debuginfo-0:1.4.8-3.el7_4.1.x86_64" }, "product_reference": "apr-debuginfo-0:1.4.8-3.el7_4.1.x86_64", "relates_to_product_reference": "7Client-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "apr-devel-0:1.4.8-3.el7_4.1.aarch64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.4.Z:apr-devel-0:1.4.8-3.el7_4.1.aarch64" }, "product_reference": "apr-devel-0:1.4.8-3.el7_4.1.aarch64", "relates_to_product_reference": "7Client-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "apr-devel-0:1.4.8-3.el7_4.1.i686 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.4.Z:apr-devel-0:1.4.8-3.el7_4.1.i686" }, "product_reference": "apr-devel-0:1.4.8-3.el7_4.1.i686", "relates_to_product_reference": "7Client-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "apr-devel-0:1.4.8-3.el7_4.1.ppc as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.4.Z:apr-devel-0:1.4.8-3.el7_4.1.ppc" }, "product_reference": "apr-devel-0:1.4.8-3.el7_4.1.ppc", "relates_to_product_reference": "7Client-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "apr-devel-0:1.4.8-3.el7_4.1.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.4.Z:apr-devel-0:1.4.8-3.el7_4.1.ppc64" }, "product_reference": "apr-devel-0:1.4.8-3.el7_4.1.ppc64", "relates_to_product_reference": "7Client-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "apr-devel-0:1.4.8-3.el7_4.1.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.4.Z:apr-devel-0:1.4.8-3.el7_4.1.ppc64le" }, "product_reference": "apr-devel-0:1.4.8-3.el7_4.1.ppc64le", "relates_to_product_reference": "7Client-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "apr-devel-0:1.4.8-3.el7_4.1.s390 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.4.Z:apr-devel-0:1.4.8-3.el7_4.1.s390" }, "product_reference": "apr-devel-0:1.4.8-3.el7_4.1.s390", "relates_to_product_reference": "7Client-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "apr-devel-0:1.4.8-3.el7_4.1.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.4.Z:apr-devel-0:1.4.8-3.el7_4.1.s390x" }, "product_reference": "apr-devel-0:1.4.8-3.el7_4.1.s390x", "relates_to_product_reference": "7Client-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "apr-devel-0:1.4.8-3.el7_4.1.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.4.Z:apr-devel-0:1.4.8-3.el7_4.1.x86_64" }, "product_reference": "apr-devel-0:1.4.8-3.el7_4.1.x86_64", "relates_to_product_reference": "7Client-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "apr-0:1.4.8-3.el7_4.1.aarch64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.4.Z:apr-0:1.4.8-3.el7_4.1.aarch64" }, "product_reference": "apr-0:1.4.8-3.el7_4.1.aarch64", "relates_to_product_reference": "7Client-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "apr-0:1.4.8-3.el7_4.1.i686 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.4.Z:apr-0:1.4.8-3.el7_4.1.i686" }, "product_reference": "apr-0:1.4.8-3.el7_4.1.i686", "relates_to_product_reference": "7Client-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "apr-0:1.4.8-3.el7_4.1.ppc as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.4.Z:apr-0:1.4.8-3.el7_4.1.ppc" }, "product_reference": "apr-0:1.4.8-3.el7_4.1.ppc", "relates_to_product_reference": "7Client-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "apr-0:1.4.8-3.el7_4.1.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.4.Z:apr-0:1.4.8-3.el7_4.1.ppc64" }, "product_reference": "apr-0:1.4.8-3.el7_4.1.ppc64", "relates_to_product_reference": "7Client-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "apr-0:1.4.8-3.el7_4.1.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.4.Z:apr-0:1.4.8-3.el7_4.1.ppc64le" }, "product_reference": "apr-0:1.4.8-3.el7_4.1.ppc64le", "relates_to_product_reference": "7Client-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "apr-0:1.4.8-3.el7_4.1.s390 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.4.Z:apr-0:1.4.8-3.el7_4.1.s390" }, "product_reference": "apr-0:1.4.8-3.el7_4.1.s390", "relates_to_product_reference": "7Client-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "apr-0:1.4.8-3.el7_4.1.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.4.Z:apr-0:1.4.8-3.el7_4.1.s390x" }, "product_reference": "apr-0:1.4.8-3.el7_4.1.s390x", "relates_to_product_reference": "7Client-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "apr-0:1.4.8-3.el7_4.1.src as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.4.Z:apr-0:1.4.8-3.el7_4.1.src" }, "product_reference": "apr-0:1.4.8-3.el7_4.1.src", "relates_to_product_reference": "7Client-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "apr-0:1.4.8-3.el7_4.1.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.4.Z:apr-0:1.4.8-3.el7_4.1.x86_64" }, "product_reference": "apr-0:1.4.8-3.el7_4.1.x86_64", "relates_to_product_reference": "7Client-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "apr-debuginfo-0:1.4.8-3.el7_4.1.aarch64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.4.Z:apr-debuginfo-0:1.4.8-3.el7_4.1.aarch64" }, "product_reference": "apr-debuginfo-0:1.4.8-3.el7_4.1.aarch64", "relates_to_product_reference": "7Client-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "apr-debuginfo-0:1.4.8-3.el7_4.1.i686 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.4.Z:apr-debuginfo-0:1.4.8-3.el7_4.1.i686" }, "product_reference": "apr-debuginfo-0:1.4.8-3.el7_4.1.i686", "relates_to_product_reference": "7Client-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "apr-debuginfo-0:1.4.8-3.el7_4.1.ppc as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.4.Z:apr-debuginfo-0:1.4.8-3.el7_4.1.ppc" }, "product_reference": "apr-debuginfo-0:1.4.8-3.el7_4.1.ppc", "relates_to_product_reference": "7Client-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "apr-debuginfo-0:1.4.8-3.el7_4.1.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.4.Z:apr-debuginfo-0:1.4.8-3.el7_4.1.ppc64" }, "product_reference": "apr-debuginfo-0:1.4.8-3.el7_4.1.ppc64", "relates_to_product_reference": "7Client-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "apr-debuginfo-0:1.4.8-3.el7_4.1.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.4.Z:apr-debuginfo-0:1.4.8-3.el7_4.1.ppc64le" }, "product_reference": "apr-debuginfo-0:1.4.8-3.el7_4.1.ppc64le", "relates_to_product_reference": "7Client-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "apr-debuginfo-0:1.4.8-3.el7_4.1.s390 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.4.Z:apr-debuginfo-0:1.4.8-3.el7_4.1.s390" }, "product_reference": "apr-debuginfo-0:1.4.8-3.el7_4.1.s390", "relates_to_product_reference": "7Client-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "apr-debuginfo-0:1.4.8-3.el7_4.1.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.4.Z:apr-debuginfo-0:1.4.8-3.el7_4.1.s390x" }, "product_reference": "apr-debuginfo-0:1.4.8-3.el7_4.1.s390x", "relates_to_product_reference": "7Client-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "apr-debuginfo-0:1.4.8-3.el7_4.1.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.4.Z:apr-debuginfo-0:1.4.8-3.el7_4.1.x86_64" }, "product_reference": "apr-debuginfo-0:1.4.8-3.el7_4.1.x86_64", "relates_to_product_reference": "7Client-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "apr-devel-0:1.4.8-3.el7_4.1.aarch64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.4.Z:apr-devel-0:1.4.8-3.el7_4.1.aarch64" }, "product_reference": "apr-devel-0:1.4.8-3.el7_4.1.aarch64", "relates_to_product_reference": "7Client-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "apr-devel-0:1.4.8-3.el7_4.1.i686 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.4.Z:apr-devel-0:1.4.8-3.el7_4.1.i686" }, "product_reference": "apr-devel-0:1.4.8-3.el7_4.1.i686", "relates_to_product_reference": "7Client-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "apr-devel-0:1.4.8-3.el7_4.1.ppc as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.4.Z:apr-devel-0:1.4.8-3.el7_4.1.ppc" }, "product_reference": "apr-devel-0:1.4.8-3.el7_4.1.ppc", "relates_to_product_reference": "7Client-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "apr-devel-0:1.4.8-3.el7_4.1.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.4.Z:apr-devel-0:1.4.8-3.el7_4.1.ppc64" }, "product_reference": "apr-devel-0:1.4.8-3.el7_4.1.ppc64", "relates_to_product_reference": "7Client-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "apr-devel-0:1.4.8-3.el7_4.1.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.4.Z:apr-devel-0:1.4.8-3.el7_4.1.ppc64le" }, "product_reference": "apr-devel-0:1.4.8-3.el7_4.1.ppc64le", "relates_to_product_reference": "7Client-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "apr-devel-0:1.4.8-3.el7_4.1.s390 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.4.Z:apr-devel-0:1.4.8-3.el7_4.1.s390" }, "product_reference": "apr-devel-0:1.4.8-3.el7_4.1.s390", "relates_to_product_reference": "7Client-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "apr-devel-0:1.4.8-3.el7_4.1.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.4.Z:apr-devel-0:1.4.8-3.el7_4.1.s390x" }, "product_reference": "apr-devel-0:1.4.8-3.el7_4.1.s390x", "relates_to_product_reference": "7Client-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "apr-devel-0:1.4.8-3.el7_4.1.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.4.Z:apr-devel-0:1.4.8-3.el7_4.1.x86_64" }, "product_reference": "apr-devel-0:1.4.8-3.el7_4.1.x86_64", "relates_to_product_reference": "7Client-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "apr-0:1.4.8-3.el7_4.1.aarch64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.4.Z:apr-0:1.4.8-3.el7_4.1.aarch64" }, "product_reference": "apr-0:1.4.8-3.el7_4.1.aarch64", "relates_to_product_reference": "7ComputeNode-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "apr-0:1.4.8-3.el7_4.1.i686 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.4.Z:apr-0:1.4.8-3.el7_4.1.i686" }, "product_reference": "apr-0:1.4.8-3.el7_4.1.i686", "relates_to_product_reference": "7ComputeNode-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "apr-0:1.4.8-3.el7_4.1.ppc as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.4.Z:apr-0:1.4.8-3.el7_4.1.ppc" }, "product_reference": "apr-0:1.4.8-3.el7_4.1.ppc", "relates_to_product_reference": "7ComputeNode-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "apr-0:1.4.8-3.el7_4.1.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.4.Z:apr-0:1.4.8-3.el7_4.1.ppc64" }, "product_reference": "apr-0:1.4.8-3.el7_4.1.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "apr-0:1.4.8-3.el7_4.1.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.4.Z:apr-0:1.4.8-3.el7_4.1.ppc64le" }, "product_reference": "apr-0:1.4.8-3.el7_4.1.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "apr-0:1.4.8-3.el7_4.1.s390 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.4.Z:apr-0:1.4.8-3.el7_4.1.s390" }, "product_reference": "apr-0:1.4.8-3.el7_4.1.s390", "relates_to_product_reference": "7ComputeNode-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "apr-0:1.4.8-3.el7_4.1.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.4.Z:apr-0:1.4.8-3.el7_4.1.s390x" }, "product_reference": "apr-0:1.4.8-3.el7_4.1.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "apr-0:1.4.8-3.el7_4.1.src as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.4.Z:apr-0:1.4.8-3.el7_4.1.src" }, "product_reference": "apr-0:1.4.8-3.el7_4.1.src", "relates_to_product_reference": "7ComputeNode-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "apr-0:1.4.8-3.el7_4.1.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.4.Z:apr-0:1.4.8-3.el7_4.1.x86_64" }, "product_reference": "apr-0:1.4.8-3.el7_4.1.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "apr-debuginfo-0:1.4.8-3.el7_4.1.aarch64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.4.Z:apr-debuginfo-0:1.4.8-3.el7_4.1.aarch64" }, "product_reference": "apr-debuginfo-0:1.4.8-3.el7_4.1.aarch64", "relates_to_product_reference": "7ComputeNode-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "apr-debuginfo-0:1.4.8-3.el7_4.1.i686 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.4.Z:apr-debuginfo-0:1.4.8-3.el7_4.1.i686" }, "product_reference": "apr-debuginfo-0:1.4.8-3.el7_4.1.i686", "relates_to_product_reference": "7ComputeNode-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "apr-debuginfo-0:1.4.8-3.el7_4.1.ppc as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.4.Z:apr-debuginfo-0:1.4.8-3.el7_4.1.ppc" }, "product_reference": "apr-debuginfo-0:1.4.8-3.el7_4.1.ppc", "relates_to_product_reference": "7ComputeNode-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "apr-debuginfo-0:1.4.8-3.el7_4.1.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.4.Z:apr-debuginfo-0:1.4.8-3.el7_4.1.ppc64" }, "product_reference": "apr-debuginfo-0:1.4.8-3.el7_4.1.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "apr-debuginfo-0:1.4.8-3.el7_4.1.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.4.Z:apr-debuginfo-0:1.4.8-3.el7_4.1.ppc64le" }, "product_reference": "apr-debuginfo-0:1.4.8-3.el7_4.1.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "apr-debuginfo-0:1.4.8-3.el7_4.1.s390 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.4.Z:apr-debuginfo-0:1.4.8-3.el7_4.1.s390" }, "product_reference": "apr-debuginfo-0:1.4.8-3.el7_4.1.s390", "relates_to_product_reference": "7ComputeNode-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "apr-debuginfo-0:1.4.8-3.el7_4.1.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.4.Z:apr-debuginfo-0:1.4.8-3.el7_4.1.s390x" }, "product_reference": "apr-debuginfo-0:1.4.8-3.el7_4.1.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "apr-debuginfo-0:1.4.8-3.el7_4.1.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.4.Z:apr-debuginfo-0:1.4.8-3.el7_4.1.x86_64" }, "product_reference": "apr-debuginfo-0:1.4.8-3.el7_4.1.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "apr-devel-0:1.4.8-3.el7_4.1.aarch64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.4.Z:apr-devel-0:1.4.8-3.el7_4.1.aarch64" }, "product_reference": "apr-devel-0:1.4.8-3.el7_4.1.aarch64", "relates_to_product_reference": "7ComputeNode-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "apr-devel-0:1.4.8-3.el7_4.1.i686 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.4.Z:apr-devel-0:1.4.8-3.el7_4.1.i686" }, "product_reference": "apr-devel-0:1.4.8-3.el7_4.1.i686", "relates_to_product_reference": "7ComputeNode-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "apr-devel-0:1.4.8-3.el7_4.1.ppc as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.4.Z:apr-devel-0:1.4.8-3.el7_4.1.ppc" }, "product_reference": "apr-devel-0:1.4.8-3.el7_4.1.ppc", "relates_to_product_reference": "7ComputeNode-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "apr-devel-0:1.4.8-3.el7_4.1.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.4.Z:apr-devel-0:1.4.8-3.el7_4.1.ppc64" }, "product_reference": "apr-devel-0:1.4.8-3.el7_4.1.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "apr-devel-0:1.4.8-3.el7_4.1.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.4.Z:apr-devel-0:1.4.8-3.el7_4.1.ppc64le" }, "product_reference": "apr-devel-0:1.4.8-3.el7_4.1.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "apr-devel-0:1.4.8-3.el7_4.1.s390 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.4.Z:apr-devel-0:1.4.8-3.el7_4.1.s390" }, "product_reference": "apr-devel-0:1.4.8-3.el7_4.1.s390", "relates_to_product_reference": "7ComputeNode-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "apr-devel-0:1.4.8-3.el7_4.1.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.4.Z:apr-devel-0:1.4.8-3.el7_4.1.s390x" }, "product_reference": "apr-devel-0:1.4.8-3.el7_4.1.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "apr-devel-0:1.4.8-3.el7_4.1.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.4.Z:apr-devel-0:1.4.8-3.el7_4.1.x86_64" }, "product_reference": "apr-devel-0:1.4.8-3.el7_4.1.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "apr-0:1.4.8-3.el7_4.1.aarch64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.4.Z:apr-0:1.4.8-3.el7_4.1.aarch64" }, "product_reference": "apr-0:1.4.8-3.el7_4.1.aarch64", "relates_to_product_reference": "7Server-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "apr-0:1.4.8-3.el7_4.1.i686 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.4.Z:apr-0:1.4.8-3.el7_4.1.i686" }, "product_reference": "apr-0:1.4.8-3.el7_4.1.i686", "relates_to_product_reference": "7Server-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "apr-0:1.4.8-3.el7_4.1.ppc as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.4.Z:apr-0:1.4.8-3.el7_4.1.ppc" }, "product_reference": "apr-0:1.4.8-3.el7_4.1.ppc", "relates_to_product_reference": "7Server-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "apr-0:1.4.8-3.el7_4.1.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.4.Z:apr-0:1.4.8-3.el7_4.1.ppc64" }, "product_reference": "apr-0:1.4.8-3.el7_4.1.ppc64", "relates_to_product_reference": "7Server-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "apr-0:1.4.8-3.el7_4.1.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.4.Z:apr-0:1.4.8-3.el7_4.1.ppc64le" }, "product_reference": "apr-0:1.4.8-3.el7_4.1.ppc64le", "relates_to_product_reference": "7Server-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "apr-0:1.4.8-3.el7_4.1.s390 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.4.Z:apr-0:1.4.8-3.el7_4.1.s390" }, "product_reference": "apr-0:1.4.8-3.el7_4.1.s390", "relates_to_product_reference": "7Server-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "apr-0:1.4.8-3.el7_4.1.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.4.Z:apr-0:1.4.8-3.el7_4.1.s390x" }, "product_reference": "apr-0:1.4.8-3.el7_4.1.s390x", "relates_to_product_reference": "7Server-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "apr-0:1.4.8-3.el7_4.1.src as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.4.Z:apr-0:1.4.8-3.el7_4.1.src" }, "product_reference": "apr-0:1.4.8-3.el7_4.1.src", "relates_to_product_reference": "7Server-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "apr-0:1.4.8-3.el7_4.1.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.4.Z:apr-0:1.4.8-3.el7_4.1.x86_64" }, "product_reference": "apr-0:1.4.8-3.el7_4.1.x86_64", "relates_to_product_reference": "7Server-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "apr-debuginfo-0:1.4.8-3.el7_4.1.aarch64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.4.Z:apr-debuginfo-0:1.4.8-3.el7_4.1.aarch64" }, "product_reference": "apr-debuginfo-0:1.4.8-3.el7_4.1.aarch64", "relates_to_product_reference": "7Server-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "apr-debuginfo-0:1.4.8-3.el7_4.1.i686 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.4.Z:apr-debuginfo-0:1.4.8-3.el7_4.1.i686" }, "product_reference": "apr-debuginfo-0:1.4.8-3.el7_4.1.i686", "relates_to_product_reference": "7Server-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "apr-debuginfo-0:1.4.8-3.el7_4.1.ppc as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.4.Z:apr-debuginfo-0:1.4.8-3.el7_4.1.ppc" }, "product_reference": "apr-debuginfo-0:1.4.8-3.el7_4.1.ppc", "relates_to_product_reference": "7Server-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "apr-debuginfo-0:1.4.8-3.el7_4.1.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.4.Z:apr-debuginfo-0:1.4.8-3.el7_4.1.ppc64" }, "product_reference": "apr-debuginfo-0:1.4.8-3.el7_4.1.ppc64", "relates_to_product_reference": "7Server-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "apr-debuginfo-0:1.4.8-3.el7_4.1.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.4.Z:apr-debuginfo-0:1.4.8-3.el7_4.1.ppc64le" }, "product_reference": "apr-debuginfo-0:1.4.8-3.el7_4.1.ppc64le", "relates_to_product_reference": "7Server-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "apr-debuginfo-0:1.4.8-3.el7_4.1.s390 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.4.Z:apr-debuginfo-0:1.4.8-3.el7_4.1.s390" }, "product_reference": "apr-debuginfo-0:1.4.8-3.el7_4.1.s390", "relates_to_product_reference": "7Server-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "apr-debuginfo-0:1.4.8-3.el7_4.1.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.4.Z:apr-debuginfo-0:1.4.8-3.el7_4.1.s390x" }, "product_reference": "apr-debuginfo-0:1.4.8-3.el7_4.1.s390x", "relates_to_product_reference": "7Server-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "apr-debuginfo-0:1.4.8-3.el7_4.1.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.4.Z:apr-debuginfo-0:1.4.8-3.el7_4.1.x86_64" }, "product_reference": "apr-debuginfo-0:1.4.8-3.el7_4.1.x86_64", "relates_to_product_reference": "7Server-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "apr-devel-0:1.4.8-3.el7_4.1.aarch64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.4.Z:apr-devel-0:1.4.8-3.el7_4.1.aarch64" }, "product_reference": "apr-devel-0:1.4.8-3.el7_4.1.aarch64", "relates_to_product_reference": "7Server-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "apr-devel-0:1.4.8-3.el7_4.1.i686 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.4.Z:apr-devel-0:1.4.8-3.el7_4.1.i686" }, "product_reference": "apr-devel-0:1.4.8-3.el7_4.1.i686", "relates_to_product_reference": "7Server-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "apr-devel-0:1.4.8-3.el7_4.1.ppc as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.4.Z:apr-devel-0:1.4.8-3.el7_4.1.ppc" }, "product_reference": "apr-devel-0:1.4.8-3.el7_4.1.ppc", "relates_to_product_reference": "7Server-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "apr-devel-0:1.4.8-3.el7_4.1.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.4.Z:apr-devel-0:1.4.8-3.el7_4.1.ppc64" }, "product_reference": "apr-devel-0:1.4.8-3.el7_4.1.ppc64", "relates_to_product_reference": "7Server-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "apr-devel-0:1.4.8-3.el7_4.1.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.4.Z:apr-devel-0:1.4.8-3.el7_4.1.ppc64le" }, "product_reference": "apr-devel-0:1.4.8-3.el7_4.1.ppc64le", "relates_to_product_reference": "7Server-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "apr-devel-0:1.4.8-3.el7_4.1.s390 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.4.Z:apr-devel-0:1.4.8-3.el7_4.1.s390" }, "product_reference": "apr-devel-0:1.4.8-3.el7_4.1.s390", "relates_to_product_reference": "7Server-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "apr-devel-0:1.4.8-3.el7_4.1.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.4.Z:apr-devel-0:1.4.8-3.el7_4.1.s390x" }, "product_reference": "apr-devel-0:1.4.8-3.el7_4.1.s390x", "relates_to_product_reference": "7Server-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "apr-devel-0:1.4.8-3.el7_4.1.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.4.Z:apr-devel-0:1.4.8-3.el7_4.1.x86_64" }, "product_reference": "apr-devel-0:1.4.8-3.el7_4.1.x86_64", "relates_to_product_reference": "7Server-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "apr-0:1.4.8-3.el7_4.1.aarch64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.4.Z:apr-0:1.4.8-3.el7_4.1.aarch64" }, "product_reference": "apr-0:1.4.8-3.el7_4.1.aarch64", "relates_to_product_reference": "7Server-Alt-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "apr-0:1.4.8-3.el7_4.1.i686 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.4.Z:apr-0:1.4.8-3.el7_4.1.i686" }, "product_reference": "apr-0:1.4.8-3.el7_4.1.i686", "relates_to_product_reference": "7Server-Alt-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "apr-0:1.4.8-3.el7_4.1.ppc as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.4.Z:apr-0:1.4.8-3.el7_4.1.ppc" }, "product_reference": "apr-0:1.4.8-3.el7_4.1.ppc", "relates_to_product_reference": "7Server-Alt-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "apr-0:1.4.8-3.el7_4.1.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.4.Z:apr-0:1.4.8-3.el7_4.1.ppc64" }, "product_reference": "apr-0:1.4.8-3.el7_4.1.ppc64", "relates_to_product_reference": "7Server-Alt-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "apr-0:1.4.8-3.el7_4.1.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.4.Z:apr-0:1.4.8-3.el7_4.1.ppc64le" }, "product_reference": "apr-0:1.4.8-3.el7_4.1.ppc64le", "relates_to_product_reference": "7Server-Alt-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "apr-0:1.4.8-3.el7_4.1.s390 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.4.Z:apr-0:1.4.8-3.el7_4.1.s390" }, "product_reference": "apr-0:1.4.8-3.el7_4.1.s390", "relates_to_product_reference": "7Server-Alt-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "apr-0:1.4.8-3.el7_4.1.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.4.Z:apr-0:1.4.8-3.el7_4.1.s390x" }, "product_reference": "apr-0:1.4.8-3.el7_4.1.s390x", "relates_to_product_reference": "7Server-Alt-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "apr-0:1.4.8-3.el7_4.1.src as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.4.Z:apr-0:1.4.8-3.el7_4.1.src" }, "product_reference": "apr-0:1.4.8-3.el7_4.1.src", "relates_to_product_reference": "7Server-Alt-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "apr-0:1.4.8-3.el7_4.1.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.4.Z:apr-0:1.4.8-3.el7_4.1.x86_64" }, "product_reference": "apr-0:1.4.8-3.el7_4.1.x86_64", "relates_to_product_reference": "7Server-Alt-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "apr-debuginfo-0:1.4.8-3.el7_4.1.aarch64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.4.Z:apr-debuginfo-0:1.4.8-3.el7_4.1.aarch64" }, "product_reference": "apr-debuginfo-0:1.4.8-3.el7_4.1.aarch64", "relates_to_product_reference": "7Server-Alt-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "apr-debuginfo-0:1.4.8-3.el7_4.1.i686 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.4.Z:apr-debuginfo-0:1.4.8-3.el7_4.1.i686" }, "product_reference": "apr-debuginfo-0:1.4.8-3.el7_4.1.i686", "relates_to_product_reference": "7Server-Alt-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "apr-debuginfo-0:1.4.8-3.el7_4.1.ppc as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.4.Z:apr-debuginfo-0:1.4.8-3.el7_4.1.ppc" }, "product_reference": "apr-debuginfo-0:1.4.8-3.el7_4.1.ppc", "relates_to_product_reference": "7Server-Alt-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "apr-debuginfo-0:1.4.8-3.el7_4.1.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.4.Z:apr-debuginfo-0:1.4.8-3.el7_4.1.ppc64" }, "product_reference": "apr-debuginfo-0:1.4.8-3.el7_4.1.ppc64", "relates_to_product_reference": "7Server-Alt-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "apr-debuginfo-0:1.4.8-3.el7_4.1.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.4.Z:apr-debuginfo-0:1.4.8-3.el7_4.1.ppc64le" }, "product_reference": "apr-debuginfo-0:1.4.8-3.el7_4.1.ppc64le", "relates_to_product_reference": "7Server-Alt-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "apr-debuginfo-0:1.4.8-3.el7_4.1.s390 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.4.Z:apr-debuginfo-0:1.4.8-3.el7_4.1.s390" }, "product_reference": "apr-debuginfo-0:1.4.8-3.el7_4.1.s390", "relates_to_product_reference": "7Server-Alt-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "apr-debuginfo-0:1.4.8-3.el7_4.1.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.4.Z:apr-debuginfo-0:1.4.8-3.el7_4.1.s390x" }, "product_reference": "apr-debuginfo-0:1.4.8-3.el7_4.1.s390x", "relates_to_product_reference": "7Server-Alt-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "apr-debuginfo-0:1.4.8-3.el7_4.1.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.4.Z:apr-debuginfo-0:1.4.8-3.el7_4.1.x86_64" }, "product_reference": "apr-debuginfo-0:1.4.8-3.el7_4.1.x86_64", "relates_to_product_reference": "7Server-Alt-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "apr-devel-0:1.4.8-3.el7_4.1.aarch64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.4.Z:apr-devel-0:1.4.8-3.el7_4.1.aarch64" }, "product_reference": "apr-devel-0:1.4.8-3.el7_4.1.aarch64", "relates_to_product_reference": "7Server-Alt-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "apr-devel-0:1.4.8-3.el7_4.1.i686 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.4.Z:apr-devel-0:1.4.8-3.el7_4.1.i686" }, "product_reference": "apr-devel-0:1.4.8-3.el7_4.1.i686", "relates_to_product_reference": "7Server-Alt-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "apr-devel-0:1.4.8-3.el7_4.1.ppc as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.4.Z:apr-devel-0:1.4.8-3.el7_4.1.ppc" }, "product_reference": "apr-devel-0:1.4.8-3.el7_4.1.ppc", "relates_to_product_reference": "7Server-Alt-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "apr-devel-0:1.4.8-3.el7_4.1.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.4.Z:apr-devel-0:1.4.8-3.el7_4.1.ppc64" }, "product_reference": "apr-devel-0:1.4.8-3.el7_4.1.ppc64", "relates_to_product_reference": "7Server-Alt-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "apr-devel-0:1.4.8-3.el7_4.1.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.4.Z:apr-devel-0:1.4.8-3.el7_4.1.ppc64le" }, "product_reference": "apr-devel-0:1.4.8-3.el7_4.1.ppc64le", "relates_to_product_reference": "7Server-Alt-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "apr-devel-0:1.4.8-3.el7_4.1.s390 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.4.Z:apr-devel-0:1.4.8-3.el7_4.1.s390" }, "product_reference": "apr-devel-0:1.4.8-3.el7_4.1.s390", "relates_to_product_reference": "7Server-Alt-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "apr-devel-0:1.4.8-3.el7_4.1.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.4.Z:apr-devel-0:1.4.8-3.el7_4.1.s390x" }, "product_reference": "apr-devel-0:1.4.8-3.el7_4.1.s390x", "relates_to_product_reference": "7Server-Alt-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "apr-devel-0:1.4.8-3.el7_4.1.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.4.Z:apr-devel-0:1.4.8-3.el7_4.1.x86_64" }, "product_reference": "apr-devel-0:1.4.8-3.el7_4.1.x86_64", "relates_to_product_reference": "7Server-Alt-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "apr-0:1.4.8-3.el7_4.1.aarch64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.4.Z:apr-0:1.4.8-3.el7_4.1.aarch64" }, "product_reference": "apr-0:1.4.8-3.el7_4.1.aarch64", "relates_to_product_reference": "7Workstation-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "apr-0:1.4.8-3.el7_4.1.i686 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.4.Z:apr-0:1.4.8-3.el7_4.1.i686" }, "product_reference": "apr-0:1.4.8-3.el7_4.1.i686", "relates_to_product_reference": "7Workstation-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "apr-0:1.4.8-3.el7_4.1.ppc as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.4.Z:apr-0:1.4.8-3.el7_4.1.ppc" }, "product_reference": "apr-0:1.4.8-3.el7_4.1.ppc", "relates_to_product_reference": "7Workstation-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "apr-0:1.4.8-3.el7_4.1.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.4.Z:apr-0:1.4.8-3.el7_4.1.ppc64" }, "product_reference": "apr-0:1.4.8-3.el7_4.1.ppc64", "relates_to_product_reference": "7Workstation-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "apr-0:1.4.8-3.el7_4.1.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.4.Z:apr-0:1.4.8-3.el7_4.1.ppc64le" }, "product_reference": "apr-0:1.4.8-3.el7_4.1.ppc64le", "relates_to_product_reference": "7Workstation-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "apr-0:1.4.8-3.el7_4.1.s390 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.4.Z:apr-0:1.4.8-3.el7_4.1.s390" }, "product_reference": "apr-0:1.4.8-3.el7_4.1.s390", "relates_to_product_reference": "7Workstation-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "apr-0:1.4.8-3.el7_4.1.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.4.Z:apr-0:1.4.8-3.el7_4.1.s390x" }, "product_reference": "apr-0:1.4.8-3.el7_4.1.s390x", "relates_to_product_reference": "7Workstation-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "apr-0:1.4.8-3.el7_4.1.src as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.4.Z:apr-0:1.4.8-3.el7_4.1.src" }, "product_reference": "apr-0:1.4.8-3.el7_4.1.src", "relates_to_product_reference": "7Workstation-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "apr-0:1.4.8-3.el7_4.1.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.4.Z:apr-0:1.4.8-3.el7_4.1.x86_64" }, "product_reference": "apr-0:1.4.8-3.el7_4.1.x86_64", "relates_to_product_reference": "7Workstation-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "apr-debuginfo-0:1.4.8-3.el7_4.1.aarch64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.4.Z:apr-debuginfo-0:1.4.8-3.el7_4.1.aarch64" }, "product_reference": "apr-debuginfo-0:1.4.8-3.el7_4.1.aarch64", "relates_to_product_reference": "7Workstation-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "apr-debuginfo-0:1.4.8-3.el7_4.1.i686 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.4.Z:apr-debuginfo-0:1.4.8-3.el7_4.1.i686" }, "product_reference": "apr-debuginfo-0:1.4.8-3.el7_4.1.i686", "relates_to_product_reference": "7Workstation-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "apr-debuginfo-0:1.4.8-3.el7_4.1.ppc as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.4.Z:apr-debuginfo-0:1.4.8-3.el7_4.1.ppc" }, "product_reference": "apr-debuginfo-0:1.4.8-3.el7_4.1.ppc", "relates_to_product_reference": "7Workstation-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "apr-debuginfo-0:1.4.8-3.el7_4.1.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.4.Z:apr-debuginfo-0:1.4.8-3.el7_4.1.ppc64" }, "product_reference": "apr-debuginfo-0:1.4.8-3.el7_4.1.ppc64", "relates_to_product_reference": "7Workstation-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "apr-debuginfo-0:1.4.8-3.el7_4.1.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.4.Z:apr-debuginfo-0:1.4.8-3.el7_4.1.ppc64le" }, "product_reference": "apr-debuginfo-0:1.4.8-3.el7_4.1.ppc64le", "relates_to_product_reference": "7Workstation-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "apr-debuginfo-0:1.4.8-3.el7_4.1.s390 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.4.Z:apr-debuginfo-0:1.4.8-3.el7_4.1.s390" }, "product_reference": "apr-debuginfo-0:1.4.8-3.el7_4.1.s390", "relates_to_product_reference": "7Workstation-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "apr-debuginfo-0:1.4.8-3.el7_4.1.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.4.Z:apr-debuginfo-0:1.4.8-3.el7_4.1.s390x" }, "product_reference": "apr-debuginfo-0:1.4.8-3.el7_4.1.s390x", "relates_to_product_reference": "7Workstation-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "apr-debuginfo-0:1.4.8-3.el7_4.1.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.4.Z:apr-debuginfo-0:1.4.8-3.el7_4.1.x86_64" }, "product_reference": "apr-debuginfo-0:1.4.8-3.el7_4.1.x86_64", "relates_to_product_reference": "7Workstation-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "apr-devel-0:1.4.8-3.el7_4.1.aarch64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.4.Z:apr-devel-0:1.4.8-3.el7_4.1.aarch64" }, "product_reference": "apr-devel-0:1.4.8-3.el7_4.1.aarch64", "relates_to_product_reference": "7Workstation-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "apr-devel-0:1.4.8-3.el7_4.1.i686 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.4.Z:apr-devel-0:1.4.8-3.el7_4.1.i686" }, "product_reference": "apr-devel-0:1.4.8-3.el7_4.1.i686", "relates_to_product_reference": "7Workstation-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "apr-devel-0:1.4.8-3.el7_4.1.ppc as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.4.Z:apr-devel-0:1.4.8-3.el7_4.1.ppc" }, "product_reference": "apr-devel-0:1.4.8-3.el7_4.1.ppc", "relates_to_product_reference": "7Workstation-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "apr-devel-0:1.4.8-3.el7_4.1.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.4.Z:apr-devel-0:1.4.8-3.el7_4.1.ppc64" }, "product_reference": "apr-devel-0:1.4.8-3.el7_4.1.ppc64", "relates_to_product_reference": "7Workstation-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "apr-devel-0:1.4.8-3.el7_4.1.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.4.Z:apr-devel-0:1.4.8-3.el7_4.1.ppc64le" }, "product_reference": "apr-devel-0:1.4.8-3.el7_4.1.ppc64le", "relates_to_product_reference": "7Workstation-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "apr-devel-0:1.4.8-3.el7_4.1.s390 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.4.Z:apr-devel-0:1.4.8-3.el7_4.1.s390" }, "product_reference": "apr-devel-0:1.4.8-3.el7_4.1.s390", "relates_to_product_reference": "7Workstation-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "apr-devel-0:1.4.8-3.el7_4.1.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.4.Z:apr-devel-0:1.4.8-3.el7_4.1.s390x" }, "product_reference": "apr-devel-0:1.4.8-3.el7_4.1.s390x", "relates_to_product_reference": "7Workstation-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "apr-devel-0:1.4.8-3.el7_4.1.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.4.Z:apr-devel-0:1.4.8-3.el7_4.1.x86_64" }, "product_reference": "apr-devel-0:1.4.8-3.el7_4.1.x86_64", "relates_to_product_reference": "7Workstation-7.4.Z" } ] }, "vulnerabilities": [ { "cve": "CVE-2017-12613", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "discovery_date": "2017-10-24T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1506523" } ], "notes": [ { "category": "description", "text": "An out-of-bounds array dereference was found in apr_time_exp_get(). An attacker could abuse an unvalidated usage of this function to cause a denial of service or potentially lead to data leak.", "title": "Vulnerability description" }, { "category": "summary", "text": "apr: Out-of-bounds array deref in apr_time_exp*() functions", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client-6.9.z:apr-0:1.3.9-5.el6_9.1.i686", "6Client-6.9.z:apr-0:1.3.9-5.el6_9.1.ppc", "6Client-6.9.z:apr-0:1.3.9-5.el6_9.1.ppc64", "6Client-6.9.z:apr-0:1.3.9-5.el6_9.1.s390", "6Client-6.9.z:apr-0:1.3.9-5.el6_9.1.s390x", "6Client-6.9.z:apr-0:1.3.9-5.el6_9.1.src", "6Client-6.9.z:apr-0:1.3.9-5.el6_9.1.x86_64", "6Client-6.9.z:apr-debuginfo-0:1.3.9-5.el6_9.1.i686", "6Client-6.9.z:apr-debuginfo-0:1.3.9-5.el6_9.1.ppc", "6Client-6.9.z:apr-debuginfo-0:1.3.9-5.el6_9.1.ppc64", "6Client-6.9.z:apr-debuginfo-0:1.3.9-5.el6_9.1.s390", "6Client-6.9.z:apr-debuginfo-0:1.3.9-5.el6_9.1.s390x", "6Client-6.9.z:apr-debuginfo-0:1.3.9-5.el6_9.1.x86_64", "6Client-6.9.z:apr-devel-0:1.3.9-5.el6_9.1.i686", "6Client-6.9.z:apr-devel-0:1.3.9-5.el6_9.1.ppc", "6Client-6.9.z:apr-devel-0:1.3.9-5.el6_9.1.ppc64", "6Client-6.9.z:apr-devel-0:1.3.9-5.el6_9.1.s390", "6Client-6.9.z:apr-devel-0:1.3.9-5.el6_9.1.s390x", "6Client-6.9.z:apr-devel-0:1.3.9-5.el6_9.1.x86_64", "6Client-optional-6.9.z:apr-0:1.3.9-5.el6_9.1.i686", "6Client-optional-6.9.z:apr-0:1.3.9-5.el6_9.1.ppc", "6Client-optional-6.9.z:apr-0:1.3.9-5.el6_9.1.ppc64", "6Client-optional-6.9.z:apr-0:1.3.9-5.el6_9.1.s390", "6Client-optional-6.9.z:apr-0:1.3.9-5.el6_9.1.s390x", "6Client-optional-6.9.z:apr-0:1.3.9-5.el6_9.1.src", "6Client-optional-6.9.z:apr-0:1.3.9-5.el6_9.1.x86_64", "6Client-optional-6.9.z:apr-debuginfo-0:1.3.9-5.el6_9.1.i686", "6Client-optional-6.9.z:apr-debuginfo-0:1.3.9-5.el6_9.1.ppc", "6Client-optional-6.9.z:apr-debuginfo-0:1.3.9-5.el6_9.1.ppc64", "6Client-optional-6.9.z:apr-debuginfo-0:1.3.9-5.el6_9.1.s390", "6Client-optional-6.9.z:apr-debuginfo-0:1.3.9-5.el6_9.1.s390x", "6Client-optional-6.9.z:apr-debuginfo-0:1.3.9-5.el6_9.1.x86_64", "6Client-optional-6.9.z:apr-devel-0:1.3.9-5.el6_9.1.i686", "6Client-optional-6.9.z:apr-devel-0:1.3.9-5.el6_9.1.ppc", "6Client-optional-6.9.z:apr-devel-0:1.3.9-5.el6_9.1.ppc64", "6Client-optional-6.9.z:apr-devel-0:1.3.9-5.el6_9.1.s390", "6Client-optional-6.9.z:apr-devel-0:1.3.9-5.el6_9.1.s390x", "6Client-optional-6.9.z:apr-devel-0:1.3.9-5.el6_9.1.x86_64", "6ComputeNode-6.9.z:apr-0:1.3.9-5.el6_9.1.i686", "6ComputeNode-6.9.z:apr-0:1.3.9-5.el6_9.1.ppc", "6ComputeNode-6.9.z:apr-0:1.3.9-5.el6_9.1.ppc64", "6ComputeNode-6.9.z:apr-0:1.3.9-5.el6_9.1.s390", "6ComputeNode-6.9.z:apr-0:1.3.9-5.el6_9.1.s390x", "6ComputeNode-6.9.z:apr-0:1.3.9-5.el6_9.1.src", "6ComputeNode-6.9.z:apr-0:1.3.9-5.el6_9.1.x86_64", "6ComputeNode-6.9.z:apr-debuginfo-0:1.3.9-5.el6_9.1.i686", "6ComputeNode-6.9.z:apr-debuginfo-0:1.3.9-5.el6_9.1.ppc", "6ComputeNode-6.9.z:apr-debuginfo-0:1.3.9-5.el6_9.1.ppc64", "6ComputeNode-6.9.z:apr-debuginfo-0:1.3.9-5.el6_9.1.s390", "6ComputeNode-6.9.z:apr-debuginfo-0:1.3.9-5.el6_9.1.s390x", "6ComputeNode-6.9.z:apr-debuginfo-0:1.3.9-5.el6_9.1.x86_64", "6ComputeNode-6.9.z:apr-devel-0:1.3.9-5.el6_9.1.i686", "6ComputeNode-6.9.z:apr-devel-0:1.3.9-5.el6_9.1.ppc", "6ComputeNode-6.9.z:apr-devel-0:1.3.9-5.el6_9.1.ppc64", "6ComputeNode-6.9.z:apr-devel-0:1.3.9-5.el6_9.1.s390", "6ComputeNode-6.9.z:apr-devel-0:1.3.9-5.el6_9.1.s390x", "6ComputeNode-6.9.z:apr-devel-0:1.3.9-5.el6_9.1.x86_64", "6ComputeNode-optional-6.9.z:apr-0:1.3.9-5.el6_9.1.i686", "6ComputeNode-optional-6.9.z:apr-0:1.3.9-5.el6_9.1.ppc", "6ComputeNode-optional-6.9.z:apr-0:1.3.9-5.el6_9.1.ppc64", "6ComputeNode-optional-6.9.z:apr-0:1.3.9-5.el6_9.1.s390", "6ComputeNode-optional-6.9.z:apr-0:1.3.9-5.el6_9.1.s390x", "6ComputeNode-optional-6.9.z:apr-0:1.3.9-5.el6_9.1.src", "6ComputeNode-optional-6.9.z:apr-0:1.3.9-5.el6_9.1.x86_64", "6ComputeNode-optional-6.9.z:apr-debuginfo-0:1.3.9-5.el6_9.1.i686", "6ComputeNode-optional-6.9.z:apr-debuginfo-0:1.3.9-5.el6_9.1.ppc", "6ComputeNode-optional-6.9.z:apr-debuginfo-0:1.3.9-5.el6_9.1.ppc64", "6ComputeNode-optional-6.9.z:apr-debuginfo-0:1.3.9-5.el6_9.1.s390", "6ComputeNode-optional-6.9.z:apr-debuginfo-0:1.3.9-5.el6_9.1.s390x", "6ComputeNode-optional-6.9.z:apr-debuginfo-0:1.3.9-5.el6_9.1.x86_64", "6ComputeNode-optional-6.9.z:apr-devel-0:1.3.9-5.el6_9.1.i686", "6ComputeNode-optional-6.9.z:apr-devel-0:1.3.9-5.el6_9.1.ppc", "6ComputeNode-optional-6.9.z:apr-devel-0:1.3.9-5.el6_9.1.ppc64", "6ComputeNode-optional-6.9.z:apr-devel-0:1.3.9-5.el6_9.1.s390", "6ComputeNode-optional-6.9.z:apr-devel-0:1.3.9-5.el6_9.1.s390x", "6ComputeNode-optional-6.9.z:apr-devel-0:1.3.9-5.el6_9.1.x86_64", "6Server-6.9.z:apr-0:1.3.9-5.el6_9.1.i686", "6Server-6.9.z:apr-0:1.3.9-5.el6_9.1.ppc", "6Server-6.9.z:apr-0:1.3.9-5.el6_9.1.ppc64", "6Server-6.9.z:apr-0:1.3.9-5.el6_9.1.s390", "6Server-6.9.z:apr-0:1.3.9-5.el6_9.1.s390x", "6Server-6.9.z:apr-0:1.3.9-5.el6_9.1.src", "6Server-6.9.z:apr-0:1.3.9-5.el6_9.1.x86_64", "6Server-6.9.z:apr-debuginfo-0:1.3.9-5.el6_9.1.i686", "6Server-6.9.z:apr-debuginfo-0:1.3.9-5.el6_9.1.ppc", "6Server-6.9.z:apr-debuginfo-0:1.3.9-5.el6_9.1.ppc64", "6Server-6.9.z:apr-debuginfo-0:1.3.9-5.el6_9.1.s390", "6Server-6.9.z:apr-debuginfo-0:1.3.9-5.el6_9.1.s390x", "6Server-6.9.z:apr-debuginfo-0:1.3.9-5.el6_9.1.x86_64", "6Server-6.9.z:apr-devel-0:1.3.9-5.el6_9.1.i686", "6Server-6.9.z:apr-devel-0:1.3.9-5.el6_9.1.ppc", "6Server-6.9.z:apr-devel-0:1.3.9-5.el6_9.1.ppc64", "6Server-6.9.z:apr-devel-0:1.3.9-5.el6_9.1.s390", "6Server-6.9.z:apr-devel-0:1.3.9-5.el6_9.1.s390x", "6Server-6.9.z:apr-devel-0:1.3.9-5.el6_9.1.x86_64", "6Workstation-6.9.z:apr-0:1.3.9-5.el6_9.1.i686", "6Workstation-6.9.z:apr-0:1.3.9-5.el6_9.1.ppc", "6Workstation-6.9.z:apr-0:1.3.9-5.el6_9.1.ppc64", "6Workstation-6.9.z:apr-0:1.3.9-5.el6_9.1.s390", "6Workstation-6.9.z:apr-0:1.3.9-5.el6_9.1.s390x", "6Workstation-6.9.z:apr-0:1.3.9-5.el6_9.1.src", "6Workstation-6.9.z:apr-0:1.3.9-5.el6_9.1.x86_64", "6Workstation-6.9.z:apr-debuginfo-0:1.3.9-5.el6_9.1.i686", "6Workstation-6.9.z:apr-debuginfo-0:1.3.9-5.el6_9.1.ppc", "6Workstation-6.9.z:apr-debuginfo-0:1.3.9-5.el6_9.1.ppc64", "6Workstation-6.9.z:apr-debuginfo-0:1.3.9-5.el6_9.1.s390", "6Workstation-6.9.z:apr-debuginfo-0:1.3.9-5.el6_9.1.s390x", "6Workstation-6.9.z:apr-debuginfo-0:1.3.9-5.el6_9.1.x86_64", "6Workstation-6.9.z:apr-devel-0:1.3.9-5.el6_9.1.i686", "6Workstation-6.9.z:apr-devel-0:1.3.9-5.el6_9.1.ppc", "6Workstation-6.9.z:apr-devel-0:1.3.9-5.el6_9.1.ppc64", "6Workstation-6.9.z:apr-devel-0:1.3.9-5.el6_9.1.s390", "6Workstation-6.9.z:apr-devel-0:1.3.9-5.el6_9.1.s390x", "6Workstation-6.9.z:apr-devel-0:1.3.9-5.el6_9.1.x86_64", "7Client-7.4.Z:apr-0:1.4.8-3.el7_4.1.aarch64", "7Client-7.4.Z:apr-0:1.4.8-3.el7_4.1.i686", "7Client-7.4.Z:apr-0:1.4.8-3.el7_4.1.ppc", "7Client-7.4.Z:apr-0:1.4.8-3.el7_4.1.ppc64", "7Client-7.4.Z:apr-0:1.4.8-3.el7_4.1.ppc64le", "7Client-7.4.Z:apr-0:1.4.8-3.el7_4.1.s390", "7Client-7.4.Z:apr-0:1.4.8-3.el7_4.1.s390x", "7Client-7.4.Z:apr-0:1.4.8-3.el7_4.1.src", "7Client-7.4.Z:apr-0:1.4.8-3.el7_4.1.x86_64", "7Client-7.4.Z:apr-debuginfo-0:1.4.8-3.el7_4.1.aarch64", "7Client-7.4.Z:apr-debuginfo-0:1.4.8-3.el7_4.1.i686", "7Client-7.4.Z:apr-debuginfo-0:1.4.8-3.el7_4.1.ppc", "7Client-7.4.Z:apr-debuginfo-0:1.4.8-3.el7_4.1.ppc64", "7Client-7.4.Z:apr-debuginfo-0:1.4.8-3.el7_4.1.ppc64le", "7Client-7.4.Z:apr-debuginfo-0:1.4.8-3.el7_4.1.s390", "7Client-7.4.Z:apr-debuginfo-0:1.4.8-3.el7_4.1.s390x", "7Client-7.4.Z:apr-debuginfo-0:1.4.8-3.el7_4.1.x86_64", "7Client-7.4.Z:apr-devel-0:1.4.8-3.el7_4.1.aarch64", "7Client-7.4.Z:apr-devel-0:1.4.8-3.el7_4.1.i686", "7Client-7.4.Z:apr-devel-0:1.4.8-3.el7_4.1.ppc", "7Client-7.4.Z:apr-devel-0:1.4.8-3.el7_4.1.ppc64", "7Client-7.4.Z:apr-devel-0:1.4.8-3.el7_4.1.ppc64le", "7Client-7.4.Z:apr-devel-0:1.4.8-3.el7_4.1.s390", "7Client-7.4.Z:apr-devel-0:1.4.8-3.el7_4.1.s390x", "7Client-7.4.Z:apr-devel-0:1.4.8-3.el7_4.1.x86_64", "7Client-optional-7.4.Z:apr-0:1.4.8-3.el7_4.1.aarch64", "7Client-optional-7.4.Z:apr-0:1.4.8-3.el7_4.1.i686", "7Client-optional-7.4.Z:apr-0:1.4.8-3.el7_4.1.ppc", "7Client-optional-7.4.Z:apr-0:1.4.8-3.el7_4.1.ppc64", "7Client-optional-7.4.Z:apr-0:1.4.8-3.el7_4.1.ppc64le", "7Client-optional-7.4.Z:apr-0:1.4.8-3.el7_4.1.s390", "7Client-optional-7.4.Z:apr-0:1.4.8-3.el7_4.1.s390x", "7Client-optional-7.4.Z:apr-0:1.4.8-3.el7_4.1.src", "7Client-optional-7.4.Z:apr-0:1.4.8-3.el7_4.1.x86_64", "7Client-optional-7.4.Z:apr-debuginfo-0:1.4.8-3.el7_4.1.aarch64", "7Client-optional-7.4.Z:apr-debuginfo-0:1.4.8-3.el7_4.1.i686", "7Client-optional-7.4.Z:apr-debuginfo-0:1.4.8-3.el7_4.1.ppc", "7Client-optional-7.4.Z:apr-debuginfo-0:1.4.8-3.el7_4.1.ppc64", "7Client-optional-7.4.Z:apr-debuginfo-0:1.4.8-3.el7_4.1.ppc64le", "7Client-optional-7.4.Z:apr-debuginfo-0:1.4.8-3.el7_4.1.s390", "7Client-optional-7.4.Z:apr-debuginfo-0:1.4.8-3.el7_4.1.s390x", "7Client-optional-7.4.Z:apr-debuginfo-0:1.4.8-3.el7_4.1.x86_64", "7Client-optional-7.4.Z:apr-devel-0:1.4.8-3.el7_4.1.aarch64", "7Client-optional-7.4.Z:apr-devel-0:1.4.8-3.el7_4.1.i686", "7Client-optional-7.4.Z:apr-devel-0:1.4.8-3.el7_4.1.ppc", "7Client-optional-7.4.Z:apr-devel-0:1.4.8-3.el7_4.1.ppc64", "7Client-optional-7.4.Z:apr-devel-0:1.4.8-3.el7_4.1.ppc64le", "7Client-optional-7.4.Z:apr-devel-0:1.4.8-3.el7_4.1.s390", "7Client-optional-7.4.Z:apr-devel-0:1.4.8-3.el7_4.1.s390x", "7Client-optional-7.4.Z:apr-devel-0:1.4.8-3.el7_4.1.x86_64", "7ComputeNode-optional-7.4.Z:apr-0:1.4.8-3.el7_4.1.aarch64", "7ComputeNode-optional-7.4.Z:apr-0:1.4.8-3.el7_4.1.i686", "7ComputeNode-optional-7.4.Z:apr-0:1.4.8-3.el7_4.1.ppc", "7ComputeNode-optional-7.4.Z:apr-0:1.4.8-3.el7_4.1.ppc64", "7ComputeNode-optional-7.4.Z:apr-0:1.4.8-3.el7_4.1.ppc64le", "7ComputeNode-optional-7.4.Z:apr-0:1.4.8-3.el7_4.1.s390", "7ComputeNode-optional-7.4.Z:apr-0:1.4.8-3.el7_4.1.s390x", "7ComputeNode-optional-7.4.Z:apr-0:1.4.8-3.el7_4.1.src", "7ComputeNode-optional-7.4.Z:apr-0:1.4.8-3.el7_4.1.x86_64", "7ComputeNode-optional-7.4.Z:apr-debuginfo-0:1.4.8-3.el7_4.1.aarch64", "7ComputeNode-optional-7.4.Z:apr-debuginfo-0:1.4.8-3.el7_4.1.i686", "7ComputeNode-optional-7.4.Z:apr-debuginfo-0:1.4.8-3.el7_4.1.ppc", "7ComputeNode-optional-7.4.Z:apr-debuginfo-0:1.4.8-3.el7_4.1.ppc64", "7ComputeNode-optional-7.4.Z:apr-debuginfo-0:1.4.8-3.el7_4.1.ppc64le", "7ComputeNode-optional-7.4.Z:apr-debuginfo-0:1.4.8-3.el7_4.1.s390", "7ComputeNode-optional-7.4.Z:apr-debuginfo-0:1.4.8-3.el7_4.1.s390x", "7ComputeNode-optional-7.4.Z:apr-debuginfo-0:1.4.8-3.el7_4.1.x86_64", "7ComputeNode-optional-7.4.Z:apr-devel-0:1.4.8-3.el7_4.1.aarch64", "7ComputeNode-optional-7.4.Z:apr-devel-0:1.4.8-3.el7_4.1.i686", "7ComputeNode-optional-7.4.Z:apr-devel-0:1.4.8-3.el7_4.1.ppc", "7ComputeNode-optional-7.4.Z:apr-devel-0:1.4.8-3.el7_4.1.ppc64", "7ComputeNode-optional-7.4.Z:apr-devel-0:1.4.8-3.el7_4.1.ppc64le", "7ComputeNode-optional-7.4.Z:apr-devel-0:1.4.8-3.el7_4.1.s390", "7ComputeNode-optional-7.4.Z:apr-devel-0:1.4.8-3.el7_4.1.s390x", "7ComputeNode-optional-7.4.Z:apr-devel-0:1.4.8-3.el7_4.1.x86_64", "7Server-7.4.Z:apr-0:1.4.8-3.el7_4.1.aarch64", "7Server-7.4.Z:apr-0:1.4.8-3.el7_4.1.i686", "7Server-7.4.Z:apr-0:1.4.8-3.el7_4.1.ppc", "7Server-7.4.Z:apr-0:1.4.8-3.el7_4.1.ppc64", "7Server-7.4.Z:apr-0:1.4.8-3.el7_4.1.ppc64le", "7Server-7.4.Z:apr-0:1.4.8-3.el7_4.1.s390", "7Server-7.4.Z:apr-0:1.4.8-3.el7_4.1.s390x", "7Server-7.4.Z:apr-0:1.4.8-3.el7_4.1.src", "7Server-7.4.Z:apr-0:1.4.8-3.el7_4.1.x86_64", "7Server-7.4.Z:apr-debuginfo-0:1.4.8-3.el7_4.1.aarch64", "7Server-7.4.Z:apr-debuginfo-0:1.4.8-3.el7_4.1.i686", "7Server-7.4.Z:apr-debuginfo-0:1.4.8-3.el7_4.1.ppc", "7Server-7.4.Z:apr-debuginfo-0:1.4.8-3.el7_4.1.ppc64", "7Server-7.4.Z:apr-debuginfo-0:1.4.8-3.el7_4.1.ppc64le", "7Server-7.4.Z:apr-debuginfo-0:1.4.8-3.el7_4.1.s390", "7Server-7.4.Z:apr-debuginfo-0:1.4.8-3.el7_4.1.s390x", "7Server-7.4.Z:apr-debuginfo-0:1.4.8-3.el7_4.1.x86_64", "7Server-7.4.Z:apr-devel-0:1.4.8-3.el7_4.1.aarch64", "7Server-7.4.Z:apr-devel-0:1.4.8-3.el7_4.1.i686", "7Server-7.4.Z:apr-devel-0:1.4.8-3.el7_4.1.ppc", "7Server-7.4.Z:apr-devel-0:1.4.8-3.el7_4.1.ppc64", "7Server-7.4.Z:apr-devel-0:1.4.8-3.el7_4.1.ppc64le", "7Server-7.4.Z:apr-devel-0:1.4.8-3.el7_4.1.s390", "7Server-7.4.Z:apr-devel-0:1.4.8-3.el7_4.1.s390x", "7Server-7.4.Z:apr-devel-0:1.4.8-3.el7_4.1.x86_64", "7Server-Alt-7.4.Z:apr-0:1.4.8-3.el7_4.1.aarch64", "7Server-Alt-7.4.Z:apr-0:1.4.8-3.el7_4.1.i686", "7Server-Alt-7.4.Z:apr-0:1.4.8-3.el7_4.1.ppc", "7Server-Alt-7.4.Z:apr-0:1.4.8-3.el7_4.1.ppc64", "7Server-Alt-7.4.Z:apr-0:1.4.8-3.el7_4.1.ppc64le", "7Server-Alt-7.4.Z:apr-0:1.4.8-3.el7_4.1.s390", "7Server-Alt-7.4.Z:apr-0:1.4.8-3.el7_4.1.s390x", "7Server-Alt-7.4.Z:apr-0:1.4.8-3.el7_4.1.src", "7Server-Alt-7.4.Z:apr-0:1.4.8-3.el7_4.1.x86_64", "7Server-Alt-7.4.Z:apr-debuginfo-0:1.4.8-3.el7_4.1.aarch64", "7Server-Alt-7.4.Z:apr-debuginfo-0:1.4.8-3.el7_4.1.i686", "7Server-Alt-7.4.Z:apr-debuginfo-0:1.4.8-3.el7_4.1.ppc", "7Server-Alt-7.4.Z:apr-debuginfo-0:1.4.8-3.el7_4.1.ppc64", "7Server-Alt-7.4.Z:apr-debuginfo-0:1.4.8-3.el7_4.1.ppc64le", "7Server-Alt-7.4.Z:apr-debuginfo-0:1.4.8-3.el7_4.1.s390", "7Server-Alt-7.4.Z:apr-debuginfo-0:1.4.8-3.el7_4.1.s390x", "7Server-Alt-7.4.Z:apr-debuginfo-0:1.4.8-3.el7_4.1.x86_64", "7Server-Alt-7.4.Z:apr-devel-0:1.4.8-3.el7_4.1.aarch64", "7Server-Alt-7.4.Z:apr-devel-0:1.4.8-3.el7_4.1.i686", "7Server-Alt-7.4.Z:apr-devel-0:1.4.8-3.el7_4.1.ppc", "7Server-Alt-7.4.Z:apr-devel-0:1.4.8-3.el7_4.1.ppc64", "7Server-Alt-7.4.Z:apr-devel-0:1.4.8-3.el7_4.1.ppc64le", "7Server-Alt-7.4.Z:apr-devel-0:1.4.8-3.el7_4.1.s390", "7Server-Alt-7.4.Z:apr-devel-0:1.4.8-3.el7_4.1.s390x", "7Server-Alt-7.4.Z:apr-devel-0:1.4.8-3.el7_4.1.x86_64", "7Workstation-7.4.Z:apr-0:1.4.8-3.el7_4.1.aarch64", "7Workstation-7.4.Z:apr-0:1.4.8-3.el7_4.1.i686", "7Workstation-7.4.Z:apr-0:1.4.8-3.el7_4.1.ppc", "7Workstation-7.4.Z:apr-0:1.4.8-3.el7_4.1.ppc64", "7Workstation-7.4.Z:apr-0:1.4.8-3.el7_4.1.ppc64le", "7Workstation-7.4.Z:apr-0:1.4.8-3.el7_4.1.s390", "7Workstation-7.4.Z:apr-0:1.4.8-3.el7_4.1.s390x", "7Workstation-7.4.Z:apr-0:1.4.8-3.el7_4.1.src", "7Workstation-7.4.Z:apr-0:1.4.8-3.el7_4.1.x86_64", "7Workstation-7.4.Z:apr-debuginfo-0:1.4.8-3.el7_4.1.aarch64", "7Workstation-7.4.Z:apr-debuginfo-0:1.4.8-3.el7_4.1.i686", "7Workstation-7.4.Z:apr-debuginfo-0:1.4.8-3.el7_4.1.ppc", "7Workstation-7.4.Z:apr-debuginfo-0:1.4.8-3.el7_4.1.ppc64", "7Workstation-7.4.Z:apr-debuginfo-0:1.4.8-3.el7_4.1.ppc64le", "7Workstation-7.4.Z:apr-debuginfo-0:1.4.8-3.el7_4.1.s390", "7Workstation-7.4.Z:apr-debuginfo-0:1.4.8-3.el7_4.1.s390x", "7Workstation-7.4.Z:apr-debuginfo-0:1.4.8-3.el7_4.1.x86_64", "7Workstation-7.4.Z:apr-devel-0:1.4.8-3.el7_4.1.aarch64", "7Workstation-7.4.Z:apr-devel-0:1.4.8-3.el7_4.1.i686", "7Workstation-7.4.Z:apr-devel-0:1.4.8-3.el7_4.1.ppc", "7Workstation-7.4.Z:apr-devel-0:1.4.8-3.el7_4.1.ppc64", "7Workstation-7.4.Z:apr-devel-0:1.4.8-3.el7_4.1.ppc64le", "7Workstation-7.4.Z:apr-devel-0:1.4.8-3.el7_4.1.s390", "7Workstation-7.4.Z:apr-devel-0:1.4.8-3.el7_4.1.s390x", "7Workstation-7.4.Z:apr-devel-0:1.4.8-3.el7_4.1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2017-12613" }, { "category": "external", "summary": "RHBZ#1506523", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1506523" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2017-12613", "url": "https://www.cve.org/CVERecord?id=CVE-2017-12613" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-12613", "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-12613" }, { "category": "external", "summary": "http://www.apache.org/dist/apr/Announcement1.x.html", "url": "http://www.apache.org/dist/apr/Announcement1.x.html" } ], "release_date": "2017-10-23T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2017-11-28T22:42:31+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nApplications using the APR libraries, such as httpd, must be restarted for this update to take effect.", "product_ids": [ "6Client-6.9.z:apr-0:1.3.9-5.el6_9.1.i686", "6Client-6.9.z:apr-0:1.3.9-5.el6_9.1.ppc", "6Client-6.9.z:apr-0:1.3.9-5.el6_9.1.ppc64", "6Client-6.9.z:apr-0:1.3.9-5.el6_9.1.s390", "6Client-6.9.z:apr-0:1.3.9-5.el6_9.1.s390x", "6Client-6.9.z:apr-0:1.3.9-5.el6_9.1.src", "6Client-6.9.z:apr-0:1.3.9-5.el6_9.1.x86_64", "6Client-6.9.z:apr-debuginfo-0:1.3.9-5.el6_9.1.i686", "6Client-6.9.z:apr-debuginfo-0:1.3.9-5.el6_9.1.ppc", "6Client-6.9.z:apr-debuginfo-0:1.3.9-5.el6_9.1.ppc64", "6Client-6.9.z:apr-debuginfo-0:1.3.9-5.el6_9.1.s390", "6Client-6.9.z:apr-debuginfo-0:1.3.9-5.el6_9.1.s390x", "6Client-6.9.z:apr-debuginfo-0:1.3.9-5.el6_9.1.x86_64", "6Client-6.9.z:apr-devel-0:1.3.9-5.el6_9.1.i686", "6Client-6.9.z:apr-devel-0:1.3.9-5.el6_9.1.ppc", "6Client-6.9.z:apr-devel-0:1.3.9-5.el6_9.1.ppc64", "6Client-6.9.z:apr-devel-0:1.3.9-5.el6_9.1.s390", "6Client-6.9.z:apr-devel-0:1.3.9-5.el6_9.1.s390x", "6Client-6.9.z:apr-devel-0:1.3.9-5.el6_9.1.x86_64", "6Client-optional-6.9.z:apr-0:1.3.9-5.el6_9.1.i686", "6Client-optional-6.9.z:apr-0:1.3.9-5.el6_9.1.ppc", "6Client-optional-6.9.z:apr-0:1.3.9-5.el6_9.1.ppc64", "6Client-optional-6.9.z:apr-0:1.3.9-5.el6_9.1.s390", "6Client-optional-6.9.z:apr-0:1.3.9-5.el6_9.1.s390x", "6Client-optional-6.9.z:apr-0:1.3.9-5.el6_9.1.src", "6Client-optional-6.9.z:apr-0:1.3.9-5.el6_9.1.x86_64", "6Client-optional-6.9.z:apr-debuginfo-0:1.3.9-5.el6_9.1.i686", "6Client-optional-6.9.z:apr-debuginfo-0:1.3.9-5.el6_9.1.ppc", "6Client-optional-6.9.z:apr-debuginfo-0:1.3.9-5.el6_9.1.ppc64", "6Client-optional-6.9.z:apr-debuginfo-0:1.3.9-5.el6_9.1.s390", "6Client-optional-6.9.z:apr-debuginfo-0:1.3.9-5.el6_9.1.s390x", "6Client-optional-6.9.z:apr-debuginfo-0:1.3.9-5.el6_9.1.x86_64", "6Client-optional-6.9.z:apr-devel-0:1.3.9-5.el6_9.1.i686", "6Client-optional-6.9.z:apr-devel-0:1.3.9-5.el6_9.1.ppc", "6Client-optional-6.9.z:apr-devel-0:1.3.9-5.el6_9.1.ppc64", "6Client-optional-6.9.z:apr-devel-0:1.3.9-5.el6_9.1.s390", "6Client-optional-6.9.z:apr-devel-0:1.3.9-5.el6_9.1.s390x", "6Client-optional-6.9.z:apr-devel-0:1.3.9-5.el6_9.1.x86_64", "6ComputeNode-6.9.z:apr-0:1.3.9-5.el6_9.1.i686", "6ComputeNode-6.9.z:apr-0:1.3.9-5.el6_9.1.ppc", "6ComputeNode-6.9.z:apr-0:1.3.9-5.el6_9.1.ppc64", "6ComputeNode-6.9.z:apr-0:1.3.9-5.el6_9.1.s390", "6ComputeNode-6.9.z:apr-0:1.3.9-5.el6_9.1.s390x", "6ComputeNode-6.9.z:apr-0:1.3.9-5.el6_9.1.src", "6ComputeNode-6.9.z:apr-0:1.3.9-5.el6_9.1.x86_64", "6ComputeNode-6.9.z:apr-debuginfo-0:1.3.9-5.el6_9.1.i686", "6ComputeNode-6.9.z:apr-debuginfo-0:1.3.9-5.el6_9.1.ppc", "6ComputeNode-6.9.z:apr-debuginfo-0:1.3.9-5.el6_9.1.ppc64", "6ComputeNode-6.9.z:apr-debuginfo-0:1.3.9-5.el6_9.1.s390", "6ComputeNode-6.9.z:apr-debuginfo-0:1.3.9-5.el6_9.1.s390x", "6ComputeNode-6.9.z:apr-debuginfo-0:1.3.9-5.el6_9.1.x86_64", "6ComputeNode-6.9.z:apr-devel-0:1.3.9-5.el6_9.1.i686", "6ComputeNode-6.9.z:apr-devel-0:1.3.9-5.el6_9.1.ppc", "6ComputeNode-6.9.z:apr-devel-0:1.3.9-5.el6_9.1.ppc64", "6ComputeNode-6.9.z:apr-devel-0:1.3.9-5.el6_9.1.s390", "6ComputeNode-6.9.z:apr-devel-0:1.3.9-5.el6_9.1.s390x", "6ComputeNode-6.9.z:apr-devel-0:1.3.9-5.el6_9.1.x86_64", "6ComputeNode-optional-6.9.z:apr-0:1.3.9-5.el6_9.1.i686", "6ComputeNode-optional-6.9.z:apr-0:1.3.9-5.el6_9.1.ppc", "6ComputeNode-optional-6.9.z:apr-0:1.3.9-5.el6_9.1.ppc64", "6ComputeNode-optional-6.9.z:apr-0:1.3.9-5.el6_9.1.s390", "6ComputeNode-optional-6.9.z:apr-0:1.3.9-5.el6_9.1.s390x", "6ComputeNode-optional-6.9.z:apr-0:1.3.9-5.el6_9.1.src", "6ComputeNode-optional-6.9.z:apr-0:1.3.9-5.el6_9.1.x86_64", "6ComputeNode-optional-6.9.z:apr-debuginfo-0:1.3.9-5.el6_9.1.i686", "6ComputeNode-optional-6.9.z:apr-debuginfo-0:1.3.9-5.el6_9.1.ppc", "6ComputeNode-optional-6.9.z:apr-debuginfo-0:1.3.9-5.el6_9.1.ppc64", "6ComputeNode-optional-6.9.z:apr-debuginfo-0:1.3.9-5.el6_9.1.s390", "6ComputeNode-optional-6.9.z:apr-debuginfo-0:1.3.9-5.el6_9.1.s390x", "6ComputeNode-optional-6.9.z:apr-debuginfo-0:1.3.9-5.el6_9.1.x86_64", "6ComputeNode-optional-6.9.z:apr-devel-0:1.3.9-5.el6_9.1.i686", "6ComputeNode-optional-6.9.z:apr-devel-0:1.3.9-5.el6_9.1.ppc", "6ComputeNode-optional-6.9.z:apr-devel-0:1.3.9-5.el6_9.1.ppc64", "6ComputeNode-optional-6.9.z:apr-devel-0:1.3.9-5.el6_9.1.s390", "6ComputeNode-optional-6.9.z:apr-devel-0:1.3.9-5.el6_9.1.s390x", "6ComputeNode-optional-6.9.z:apr-devel-0:1.3.9-5.el6_9.1.x86_64", "6Server-6.9.z:apr-0:1.3.9-5.el6_9.1.i686", "6Server-6.9.z:apr-0:1.3.9-5.el6_9.1.ppc", "6Server-6.9.z:apr-0:1.3.9-5.el6_9.1.ppc64", "6Server-6.9.z:apr-0:1.3.9-5.el6_9.1.s390", "6Server-6.9.z:apr-0:1.3.9-5.el6_9.1.s390x", "6Server-6.9.z:apr-0:1.3.9-5.el6_9.1.src", "6Server-6.9.z:apr-0:1.3.9-5.el6_9.1.x86_64", "6Server-6.9.z:apr-debuginfo-0:1.3.9-5.el6_9.1.i686", "6Server-6.9.z:apr-debuginfo-0:1.3.9-5.el6_9.1.ppc", "6Server-6.9.z:apr-debuginfo-0:1.3.9-5.el6_9.1.ppc64", "6Server-6.9.z:apr-debuginfo-0:1.3.9-5.el6_9.1.s390", "6Server-6.9.z:apr-debuginfo-0:1.3.9-5.el6_9.1.s390x", "6Server-6.9.z:apr-debuginfo-0:1.3.9-5.el6_9.1.x86_64", "6Server-6.9.z:apr-devel-0:1.3.9-5.el6_9.1.i686", "6Server-6.9.z:apr-devel-0:1.3.9-5.el6_9.1.ppc", "6Server-6.9.z:apr-devel-0:1.3.9-5.el6_9.1.ppc64", "6Server-6.9.z:apr-devel-0:1.3.9-5.el6_9.1.s390", "6Server-6.9.z:apr-devel-0:1.3.9-5.el6_9.1.s390x", "6Server-6.9.z:apr-devel-0:1.3.9-5.el6_9.1.x86_64", "6Workstation-6.9.z:apr-0:1.3.9-5.el6_9.1.i686", "6Workstation-6.9.z:apr-0:1.3.9-5.el6_9.1.ppc", "6Workstation-6.9.z:apr-0:1.3.9-5.el6_9.1.ppc64", "6Workstation-6.9.z:apr-0:1.3.9-5.el6_9.1.s390", "6Workstation-6.9.z:apr-0:1.3.9-5.el6_9.1.s390x", "6Workstation-6.9.z:apr-0:1.3.9-5.el6_9.1.src", "6Workstation-6.9.z:apr-0:1.3.9-5.el6_9.1.x86_64", "6Workstation-6.9.z:apr-debuginfo-0:1.3.9-5.el6_9.1.i686", "6Workstation-6.9.z:apr-debuginfo-0:1.3.9-5.el6_9.1.ppc", "6Workstation-6.9.z:apr-debuginfo-0:1.3.9-5.el6_9.1.ppc64", "6Workstation-6.9.z:apr-debuginfo-0:1.3.9-5.el6_9.1.s390", "6Workstation-6.9.z:apr-debuginfo-0:1.3.9-5.el6_9.1.s390x", "6Workstation-6.9.z:apr-debuginfo-0:1.3.9-5.el6_9.1.x86_64", "6Workstation-6.9.z:apr-devel-0:1.3.9-5.el6_9.1.i686", "6Workstation-6.9.z:apr-devel-0:1.3.9-5.el6_9.1.ppc", "6Workstation-6.9.z:apr-devel-0:1.3.9-5.el6_9.1.ppc64", "6Workstation-6.9.z:apr-devel-0:1.3.9-5.el6_9.1.s390", "6Workstation-6.9.z:apr-devel-0:1.3.9-5.el6_9.1.s390x", "6Workstation-6.9.z:apr-devel-0:1.3.9-5.el6_9.1.x86_64", "7Client-7.4.Z:apr-0:1.4.8-3.el7_4.1.aarch64", "7Client-7.4.Z:apr-0:1.4.8-3.el7_4.1.i686", "7Client-7.4.Z:apr-0:1.4.8-3.el7_4.1.ppc", "7Client-7.4.Z:apr-0:1.4.8-3.el7_4.1.ppc64", "7Client-7.4.Z:apr-0:1.4.8-3.el7_4.1.ppc64le", "7Client-7.4.Z:apr-0:1.4.8-3.el7_4.1.s390", "7Client-7.4.Z:apr-0:1.4.8-3.el7_4.1.s390x", "7Client-7.4.Z:apr-0:1.4.8-3.el7_4.1.src", "7Client-7.4.Z:apr-0:1.4.8-3.el7_4.1.x86_64", "7Client-7.4.Z:apr-debuginfo-0:1.4.8-3.el7_4.1.aarch64", "7Client-7.4.Z:apr-debuginfo-0:1.4.8-3.el7_4.1.i686", "7Client-7.4.Z:apr-debuginfo-0:1.4.8-3.el7_4.1.ppc", "7Client-7.4.Z:apr-debuginfo-0:1.4.8-3.el7_4.1.ppc64", "7Client-7.4.Z:apr-debuginfo-0:1.4.8-3.el7_4.1.ppc64le", "7Client-7.4.Z:apr-debuginfo-0:1.4.8-3.el7_4.1.s390", "7Client-7.4.Z:apr-debuginfo-0:1.4.8-3.el7_4.1.s390x", "7Client-7.4.Z:apr-debuginfo-0:1.4.8-3.el7_4.1.x86_64", "7Client-7.4.Z:apr-devel-0:1.4.8-3.el7_4.1.aarch64", "7Client-7.4.Z:apr-devel-0:1.4.8-3.el7_4.1.i686", "7Client-7.4.Z:apr-devel-0:1.4.8-3.el7_4.1.ppc", "7Client-7.4.Z:apr-devel-0:1.4.8-3.el7_4.1.ppc64", "7Client-7.4.Z:apr-devel-0:1.4.8-3.el7_4.1.ppc64le", "7Client-7.4.Z:apr-devel-0:1.4.8-3.el7_4.1.s390", "7Client-7.4.Z:apr-devel-0:1.4.8-3.el7_4.1.s390x", "7Client-7.4.Z:apr-devel-0:1.4.8-3.el7_4.1.x86_64", "7Client-optional-7.4.Z:apr-0:1.4.8-3.el7_4.1.aarch64", "7Client-optional-7.4.Z:apr-0:1.4.8-3.el7_4.1.i686", "7Client-optional-7.4.Z:apr-0:1.4.8-3.el7_4.1.ppc", "7Client-optional-7.4.Z:apr-0:1.4.8-3.el7_4.1.ppc64", "7Client-optional-7.4.Z:apr-0:1.4.8-3.el7_4.1.ppc64le", "7Client-optional-7.4.Z:apr-0:1.4.8-3.el7_4.1.s390", "7Client-optional-7.4.Z:apr-0:1.4.8-3.el7_4.1.s390x", "7Client-optional-7.4.Z:apr-0:1.4.8-3.el7_4.1.src", "7Client-optional-7.4.Z:apr-0:1.4.8-3.el7_4.1.x86_64", "7Client-optional-7.4.Z:apr-debuginfo-0:1.4.8-3.el7_4.1.aarch64", "7Client-optional-7.4.Z:apr-debuginfo-0:1.4.8-3.el7_4.1.i686", "7Client-optional-7.4.Z:apr-debuginfo-0:1.4.8-3.el7_4.1.ppc", "7Client-optional-7.4.Z:apr-debuginfo-0:1.4.8-3.el7_4.1.ppc64", "7Client-optional-7.4.Z:apr-debuginfo-0:1.4.8-3.el7_4.1.ppc64le", "7Client-optional-7.4.Z:apr-debuginfo-0:1.4.8-3.el7_4.1.s390", "7Client-optional-7.4.Z:apr-debuginfo-0:1.4.8-3.el7_4.1.s390x", "7Client-optional-7.4.Z:apr-debuginfo-0:1.4.8-3.el7_4.1.x86_64", "7Client-optional-7.4.Z:apr-devel-0:1.4.8-3.el7_4.1.aarch64", "7Client-optional-7.4.Z:apr-devel-0:1.4.8-3.el7_4.1.i686", "7Client-optional-7.4.Z:apr-devel-0:1.4.8-3.el7_4.1.ppc", "7Client-optional-7.4.Z:apr-devel-0:1.4.8-3.el7_4.1.ppc64", "7Client-optional-7.4.Z:apr-devel-0:1.4.8-3.el7_4.1.ppc64le", "7Client-optional-7.4.Z:apr-devel-0:1.4.8-3.el7_4.1.s390", "7Client-optional-7.4.Z:apr-devel-0:1.4.8-3.el7_4.1.s390x", "7Client-optional-7.4.Z:apr-devel-0:1.4.8-3.el7_4.1.x86_64", "7ComputeNode-optional-7.4.Z:apr-0:1.4.8-3.el7_4.1.aarch64", "7ComputeNode-optional-7.4.Z:apr-0:1.4.8-3.el7_4.1.i686", "7ComputeNode-optional-7.4.Z:apr-0:1.4.8-3.el7_4.1.ppc", "7ComputeNode-optional-7.4.Z:apr-0:1.4.8-3.el7_4.1.ppc64", "7ComputeNode-optional-7.4.Z:apr-0:1.4.8-3.el7_4.1.ppc64le", "7ComputeNode-optional-7.4.Z:apr-0:1.4.8-3.el7_4.1.s390", "7ComputeNode-optional-7.4.Z:apr-0:1.4.8-3.el7_4.1.s390x", "7ComputeNode-optional-7.4.Z:apr-0:1.4.8-3.el7_4.1.src", "7ComputeNode-optional-7.4.Z:apr-0:1.4.8-3.el7_4.1.x86_64", "7ComputeNode-optional-7.4.Z:apr-debuginfo-0:1.4.8-3.el7_4.1.aarch64", "7ComputeNode-optional-7.4.Z:apr-debuginfo-0:1.4.8-3.el7_4.1.i686", "7ComputeNode-optional-7.4.Z:apr-debuginfo-0:1.4.8-3.el7_4.1.ppc", "7ComputeNode-optional-7.4.Z:apr-debuginfo-0:1.4.8-3.el7_4.1.ppc64", "7ComputeNode-optional-7.4.Z:apr-debuginfo-0:1.4.8-3.el7_4.1.ppc64le", "7ComputeNode-optional-7.4.Z:apr-debuginfo-0:1.4.8-3.el7_4.1.s390", "7ComputeNode-optional-7.4.Z:apr-debuginfo-0:1.4.8-3.el7_4.1.s390x", "7ComputeNode-optional-7.4.Z:apr-debuginfo-0:1.4.8-3.el7_4.1.x86_64", "7ComputeNode-optional-7.4.Z:apr-devel-0:1.4.8-3.el7_4.1.aarch64", "7ComputeNode-optional-7.4.Z:apr-devel-0:1.4.8-3.el7_4.1.i686", "7ComputeNode-optional-7.4.Z:apr-devel-0:1.4.8-3.el7_4.1.ppc", "7ComputeNode-optional-7.4.Z:apr-devel-0:1.4.8-3.el7_4.1.ppc64", "7ComputeNode-optional-7.4.Z:apr-devel-0:1.4.8-3.el7_4.1.ppc64le", "7ComputeNode-optional-7.4.Z:apr-devel-0:1.4.8-3.el7_4.1.s390", "7ComputeNode-optional-7.4.Z:apr-devel-0:1.4.8-3.el7_4.1.s390x", "7ComputeNode-optional-7.4.Z:apr-devel-0:1.4.8-3.el7_4.1.x86_64", "7Server-7.4.Z:apr-0:1.4.8-3.el7_4.1.aarch64", "7Server-7.4.Z:apr-0:1.4.8-3.el7_4.1.i686", "7Server-7.4.Z:apr-0:1.4.8-3.el7_4.1.ppc", "7Server-7.4.Z:apr-0:1.4.8-3.el7_4.1.ppc64", "7Server-7.4.Z:apr-0:1.4.8-3.el7_4.1.ppc64le", "7Server-7.4.Z:apr-0:1.4.8-3.el7_4.1.s390", "7Server-7.4.Z:apr-0:1.4.8-3.el7_4.1.s390x", "7Server-7.4.Z:apr-0:1.4.8-3.el7_4.1.src", "7Server-7.4.Z:apr-0:1.4.8-3.el7_4.1.x86_64", "7Server-7.4.Z:apr-debuginfo-0:1.4.8-3.el7_4.1.aarch64", "7Server-7.4.Z:apr-debuginfo-0:1.4.8-3.el7_4.1.i686", "7Server-7.4.Z:apr-debuginfo-0:1.4.8-3.el7_4.1.ppc", "7Server-7.4.Z:apr-debuginfo-0:1.4.8-3.el7_4.1.ppc64", "7Server-7.4.Z:apr-debuginfo-0:1.4.8-3.el7_4.1.ppc64le", "7Server-7.4.Z:apr-debuginfo-0:1.4.8-3.el7_4.1.s390", "7Server-7.4.Z:apr-debuginfo-0:1.4.8-3.el7_4.1.s390x", "7Server-7.4.Z:apr-debuginfo-0:1.4.8-3.el7_4.1.x86_64", "7Server-7.4.Z:apr-devel-0:1.4.8-3.el7_4.1.aarch64", "7Server-7.4.Z:apr-devel-0:1.4.8-3.el7_4.1.i686", "7Server-7.4.Z:apr-devel-0:1.4.8-3.el7_4.1.ppc", "7Server-7.4.Z:apr-devel-0:1.4.8-3.el7_4.1.ppc64", "7Server-7.4.Z:apr-devel-0:1.4.8-3.el7_4.1.ppc64le", "7Server-7.4.Z:apr-devel-0:1.4.8-3.el7_4.1.s390", "7Server-7.4.Z:apr-devel-0:1.4.8-3.el7_4.1.s390x", "7Server-7.4.Z:apr-devel-0:1.4.8-3.el7_4.1.x86_64", "7Server-Alt-7.4.Z:apr-0:1.4.8-3.el7_4.1.aarch64", "7Server-Alt-7.4.Z:apr-0:1.4.8-3.el7_4.1.i686", "7Server-Alt-7.4.Z:apr-0:1.4.8-3.el7_4.1.ppc", "7Server-Alt-7.4.Z:apr-0:1.4.8-3.el7_4.1.ppc64", "7Server-Alt-7.4.Z:apr-0:1.4.8-3.el7_4.1.ppc64le", "7Server-Alt-7.4.Z:apr-0:1.4.8-3.el7_4.1.s390", "7Server-Alt-7.4.Z:apr-0:1.4.8-3.el7_4.1.s390x", "7Server-Alt-7.4.Z:apr-0:1.4.8-3.el7_4.1.src", "7Server-Alt-7.4.Z:apr-0:1.4.8-3.el7_4.1.x86_64", "7Server-Alt-7.4.Z:apr-debuginfo-0:1.4.8-3.el7_4.1.aarch64", "7Server-Alt-7.4.Z:apr-debuginfo-0:1.4.8-3.el7_4.1.i686", "7Server-Alt-7.4.Z:apr-debuginfo-0:1.4.8-3.el7_4.1.ppc", "7Server-Alt-7.4.Z:apr-debuginfo-0:1.4.8-3.el7_4.1.ppc64", "7Server-Alt-7.4.Z:apr-debuginfo-0:1.4.8-3.el7_4.1.ppc64le", "7Server-Alt-7.4.Z:apr-debuginfo-0:1.4.8-3.el7_4.1.s390", "7Server-Alt-7.4.Z:apr-debuginfo-0:1.4.8-3.el7_4.1.s390x", "7Server-Alt-7.4.Z:apr-debuginfo-0:1.4.8-3.el7_4.1.x86_64", "7Server-Alt-7.4.Z:apr-devel-0:1.4.8-3.el7_4.1.aarch64", "7Server-Alt-7.4.Z:apr-devel-0:1.4.8-3.el7_4.1.i686", "7Server-Alt-7.4.Z:apr-devel-0:1.4.8-3.el7_4.1.ppc", "7Server-Alt-7.4.Z:apr-devel-0:1.4.8-3.el7_4.1.ppc64", "7Server-Alt-7.4.Z:apr-devel-0:1.4.8-3.el7_4.1.ppc64le", "7Server-Alt-7.4.Z:apr-devel-0:1.4.8-3.el7_4.1.s390", "7Server-Alt-7.4.Z:apr-devel-0:1.4.8-3.el7_4.1.s390x", "7Server-Alt-7.4.Z:apr-devel-0:1.4.8-3.el7_4.1.x86_64", "7Workstation-7.4.Z:apr-0:1.4.8-3.el7_4.1.aarch64", "7Workstation-7.4.Z:apr-0:1.4.8-3.el7_4.1.i686", "7Workstation-7.4.Z:apr-0:1.4.8-3.el7_4.1.ppc", "7Workstation-7.4.Z:apr-0:1.4.8-3.el7_4.1.ppc64", "7Workstation-7.4.Z:apr-0:1.4.8-3.el7_4.1.ppc64le", "7Workstation-7.4.Z:apr-0:1.4.8-3.el7_4.1.s390", "7Workstation-7.4.Z:apr-0:1.4.8-3.el7_4.1.s390x", "7Workstation-7.4.Z:apr-0:1.4.8-3.el7_4.1.src", "7Workstation-7.4.Z:apr-0:1.4.8-3.el7_4.1.x86_64", "7Workstation-7.4.Z:apr-debuginfo-0:1.4.8-3.el7_4.1.aarch64", "7Workstation-7.4.Z:apr-debuginfo-0:1.4.8-3.el7_4.1.i686", "7Workstation-7.4.Z:apr-debuginfo-0:1.4.8-3.el7_4.1.ppc", "7Workstation-7.4.Z:apr-debuginfo-0:1.4.8-3.el7_4.1.ppc64", "7Workstation-7.4.Z:apr-debuginfo-0:1.4.8-3.el7_4.1.ppc64le", "7Workstation-7.4.Z:apr-debuginfo-0:1.4.8-3.el7_4.1.s390", "7Workstation-7.4.Z:apr-debuginfo-0:1.4.8-3.el7_4.1.s390x", "7Workstation-7.4.Z:apr-debuginfo-0:1.4.8-3.el7_4.1.x86_64", "7Workstation-7.4.Z:apr-devel-0:1.4.8-3.el7_4.1.aarch64", "7Workstation-7.4.Z:apr-devel-0:1.4.8-3.el7_4.1.i686", "7Workstation-7.4.Z:apr-devel-0:1.4.8-3.el7_4.1.ppc", "7Workstation-7.4.Z:apr-devel-0:1.4.8-3.el7_4.1.ppc64", "7Workstation-7.4.Z:apr-devel-0:1.4.8-3.el7_4.1.ppc64le", "7Workstation-7.4.Z:apr-devel-0:1.4.8-3.el7_4.1.s390", "7Workstation-7.4.Z:apr-devel-0:1.4.8-3.el7_4.1.s390x", "7Workstation-7.4.Z:apr-devel-0:1.4.8-3.el7_4.1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2017:3270" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.4, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H", "version": "3.0" }, "products": [ "6Client-6.9.z:apr-0:1.3.9-5.el6_9.1.i686", "6Client-6.9.z:apr-0:1.3.9-5.el6_9.1.ppc", "6Client-6.9.z:apr-0:1.3.9-5.el6_9.1.ppc64", "6Client-6.9.z:apr-0:1.3.9-5.el6_9.1.s390", "6Client-6.9.z:apr-0:1.3.9-5.el6_9.1.s390x", "6Client-6.9.z:apr-0:1.3.9-5.el6_9.1.src", "6Client-6.9.z:apr-0:1.3.9-5.el6_9.1.x86_64", "6Client-6.9.z:apr-debuginfo-0:1.3.9-5.el6_9.1.i686", "6Client-6.9.z:apr-debuginfo-0:1.3.9-5.el6_9.1.ppc", "6Client-6.9.z:apr-debuginfo-0:1.3.9-5.el6_9.1.ppc64", "6Client-6.9.z:apr-debuginfo-0:1.3.9-5.el6_9.1.s390", "6Client-6.9.z:apr-debuginfo-0:1.3.9-5.el6_9.1.s390x", "6Client-6.9.z:apr-debuginfo-0:1.3.9-5.el6_9.1.x86_64", "6Client-6.9.z:apr-devel-0:1.3.9-5.el6_9.1.i686", "6Client-6.9.z:apr-devel-0:1.3.9-5.el6_9.1.ppc", "6Client-6.9.z:apr-devel-0:1.3.9-5.el6_9.1.ppc64", "6Client-6.9.z:apr-devel-0:1.3.9-5.el6_9.1.s390", "6Client-6.9.z:apr-devel-0:1.3.9-5.el6_9.1.s390x", "6Client-6.9.z:apr-devel-0:1.3.9-5.el6_9.1.x86_64", "6Client-optional-6.9.z:apr-0:1.3.9-5.el6_9.1.i686", "6Client-optional-6.9.z:apr-0:1.3.9-5.el6_9.1.ppc", "6Client-optional-6.9.z:apr-0:1.3.9-5.el6_9.1.ppc64", "6Client-optional-6.9.z:apr-0:1.3.9-5.el6_9.1.s390", "6Client-optional-6.9.z:apr-0:1.3.9-5.el6_9.1.s390x", "6Client-optional-6.9.z:apr-0:1.3.9-5.el6_9.1.src", "6Client-optional-6.9.z:apr-0:1.3.9-5.el6_9.1.x86_64", "6Client-optional-6.9.z:apr-debuginfo-0:1.3.9-5.el6_9.1.i686", "6Client-optional-6.9.z:apr-debuginfo-0:1.3.9-5.el6_9.1.ppc", "6Client-optional-6.9.z:apr-debuginfo-0:1.3.9-5.el6_9.1.ppc64", "6Client-optional-6.9.z:apr-debuginfo-0:1.3.9-5.el6_9.1.s390", "6Client-optional-6.9.z:apr-debuginfo-0:1.3.9-5.el6_9.1.s390x", "6Client-optional-6.9.z:apr-debuginfo-0:1.3.9-5.el6_9.1.x86_64", "6Client-optional-6.9.z:apr-devel-0:1.3.9-5.el6_9.1.i686", "6Client-optional-6.9.z:apr-devel-0:1.3.9-5.el6_9.1.ppc", "6Client-optional-6.9.z:apr-devel-0:1.3.9-5.el6_9.1.ppc64", "6Client-optional-6.9.z:apr-devel-0:1.3.9-5.el6_9.1.s390", "6Client-optional-6.9.z:apr-devel-0:1.3.9-5.el6_9.1.s390x", "6Client-optional-6.9.z:apr-devel-0:1.3.9-5.el6_9.1.x86_64", "6ComputeNode-6.9.z:apr-0:1.3.9-5.el6_9.1.i686", "6ComputeNode-6.9.z:apr-0:1.3.9-5.el6_9.1.ppc", "6ComputeNode-6.9.z:apr-0:1.3.9-5.el6_9.1.ppc64", "6ComputeNode-6.9.z:apr-0:1.3.9-5.el6_9.1.s390", "6ComputeNode-6.9.z:apr-0:1.3.9-5.el6_9.1.s390x", "6ComputeNode-6.9.z:apr-0:1.3.9-5.el6_9.1.src", "6ComputeNode-6.9.z:apr-0:1.3.9-5.el6_9.1.x86_64", "6ComputeNode-6.9.z:apr-debuginfo-0:1.3.9-5.el6_9.1.i686", "6ComputeNode-6.9.z:apr-debuginfo-0:1.3.9-5.el6_9.1.ppc", "6ComputeNode-6.9.z:apr-debuginfo-0:1.3.9-5.el6_9.1.ppc64", "6ComputeNode-6.9.z:apr-debuginfo-0:1.3.9-5.el6_9.1.s390", "6ComputeNode-6.9.z:apr-debuginfo-0:1.3.9-5.el6_9.1.s390x", "6ComputeNode-6.9.z:apr-debuginfo-0:1.3.9-5.el6_9.1.x86_64", "6ComputeNode-6.9.z:apr-devel-0:1.3.9-5.el6_9.1.i686", "6ComputeNode-6.9.z:apr-devel-0:1.3.9-5.el6_9.1.ppc", "6ComputeNode-6.9.z:apr-devel-0:1.3.9-5.el6_9.1.ppc64", "6ComputeNode-6.9.z:apr-devel-0:1.3.9-5.el6_9.1.s390", "6ComputeNode-6.9.z:apr-devel-0:1.3.9-5.el6_9.1.s390x", "6ComputeNode-6.9.z:apr-devel-0:1.3.9-5.el6_9.1.x86_64", "6ComputeNode-optional-6.9.z:apr-0:1.3.9-5.el6_9.1.i686", "6ComputeNode-optional-6.9.z:apr-0:1.3.9-5.el6_9.1.ppc", "6ComputeNode-optional-6.9.z:apr-0:1.3.9-5.el6_9.1.ppc64", "6ComputeNode-optional-6.9.z:apr-0:1.3.9-5.el6_9.1.s390", "6ComputeNode-optional-6.9.z:apr-0:1.3.9-5.el6_9.1.s390x", "6ComputeNode-optional-6.9.z:apr-0:1.3.9-5.el6_9.1.src", "6ComputeNode-optional-6.9.z:apr-0:1.3.9-5.el6_9.1.x86_64", "6ComputeNode-optional-6.9.z:apr-debuginfo-0:1.3.9-5.el6_9.1.i686", "6ComputeNode-optional-6.9.z:apr-debuginfo-0:1.3.9-5.el6_9.1.ppc", "6ComputeNode-optional-6.9.z:apr-debuginfo-0:1.3.9-5.el6_9.1.ppc64", "6ComputeNode-optional-6.9.z:apr-debuginfo-0:1.3.9-5.el6_9.1.s390", "6ComputeNode-optional-6.9.z:apr-debuginfo-0:1.3.9-5.el6_9.1.s390x", "6ComputeNode-optional-6.9.z:apr-debuginfo-0:1.3.9-5.el6_9.1.x86_64", "6ComputeNode-optional-6.9.z:apr-devel-0:1.3.9-5.el6_9.1.i686", "6ComputeNode-optional-6.9.z:apr-devel-0:1.3.9-5.el6_9.1.ppc", "6ComputeNode-optional-6.9.z:apr-devel-0:1.3.9-5.el6_9.1.ppc64", "6ComputeNode-optional-6.9.z:apr-devel-0:1.3.9-5.el6_9.1.s390", "6ComputeNode-optional-6.9.z:apr-devel-0:1.3.9-5.el6_9.1.s390x", "6ComputeNode-optional-6.9.z:apr-devel-0:1.3.9-5.el6_9.1.x86_64", "6Server-6.9.z:apr-0:1.3.9-5.el6_9.1.i686", "6Server-6.9.z:apr-0:1.3.9-5.el6_9.1.ppc", "6Server-6.9.z:apr-0:1.3.9-5.el6_9.1.ppc64", "6Server-6.9.z:apr-0:1.3.9-5.el6_9.1.s390", "6Server-6.9.z:apr-0:1.3.9-5.el6_9.1.s390x", "6Server-6.9.z:apr-0:1.3.9-5.el6_9.1.src", "6Server-6.9.z:apr-0:1.3.9-5.el6_9.1.x86_64", "6Server-6.9.z:apr-debuginfo-0:1.3.9-5.el6_9.1.i686", "6Server-6.9.z:apr-debuginfo-0:1.3.9-5.el6_9.1.ppc", "6Server-6.9.z:apr-debuginfo-0:1.3.9-5.el6_9.1.ppc64", "6Server-6.9.z:apr-debuginfo-0:1.3.9-5.el6_9.1.s390", "6Server-6.9.z:apr-debuginfo-0:1.3.9-5.el6_9.1.s390x", "6Server-6.9.z:apr-debuginfo-0:1.3.9-5.el6_9.1.x86_64", "6Server-6.9.z:apr-devel-0:1.3.9-5.el6_9.1.i686", "6Server-6.9.z:apr-devel-0:1.3.9-5.el6_9.1.ppc", "6Server-6.9.z:apr-devel-0:1.3.9-5.el6_9.1.ppc64", "6Server-6.9.z:apr-devel-0:1.3.9-5.el6_9.1.s390", "6Server-6.9.z:apr-devel-0:1.3.9-5.el6_9.1.s390x", "6Server-6.9.z:apr-devel-0:1.3.9-5.el6_9.1.x86_64", "6Workstation-6.9.z:apr-0:1.3.9-5.el6_9.1.i686", "6Workstation-6.9.z:apr-0:1.3.9-5.el6_9.1.ppc", "6Workstation-6.9.z:apr-0:1.3.9-5.el6_9.1.ppc64", "6Workstation-6.9.z:apr-0:1.3.9-5.el6_9.1.s390", "6Workstation-6.9.z:apr-0:1.3.9-5.el6_9.1.s390x", "6Workstation-6.9.z:apr-0:1.3.9-5.el6_9.1.src", "6Workstation-6.9.z:apr-0:1.3.9-5.el6_9.1.x86_64", "6Workstation-6.9.z:apr-debuginfo-0:1.3.9-5.el6_9.1.i686", "6Workstation-6.9.z:apr-debuginfo-0:1.3.9-5.el6_9.1.ppc", "6Workstation-6.9.z:apr-debuginfo-0:1.3.9-5.el6_9.1.ppc64", "6Workstation-6.9.z:apr-debuginfo-0:1.3.9-5.el6_9.1.s390", "6Workstation-6.9.z:apr-debuginfo-0:1.3.9-5.el6_9.1.s390x", "6Workstation-6.9.z:apr-debuginfo-0:1.3.9-5.el6_9.1.x86_64", "6Workstation-6.9.z:apr-devel-0:1.3.9-5.el6_9.1.i686", "6Workstation-6.9.z:apr-devel-0:1.3.9-5.el6_9.1.ppc", "6Workstation-6.9.z:apr-devel-0:1.3.9-5.el6_9.1.ppc64", "6Workstation-6.9.z:apr-devel-0:1.3.9-5.el6_9.1.s390", "6Workstation-6.9.z:apr-devel-0:1.3.9-5.el6_9.1.s390x", "6Workstation-6.9.z:apr-devel-0:1.3.9-5.el6_9.1.x86_64", "7Client-7.4.Z:apr-0:1.4.8-3.el7_4.1.aarch64", "7Client-7.4.Z:apr-0:1.4.8-3.el7_4.1.i686", "7Client-7.4.Z:apr-0:1.4.8-3.el7_4.1.ppc", "7Client-7.4.Z:apr-0:1.4.8-3.el7_4.1.ppc64", "7Client-7.4.Z:apr-0:1.4.8-3.el7_4.1.ppc64le", "7Client-7.4.Z:apr-0:1.4.8-3.el7_4.1.s390", "7Client-7.4.Z:apr-0:1.4.8-3.el7_4.1.s390x", "7Client-7.4.Z:apr-0:1.4.8-3.el7_4.1.src", "7Client-7.4.Z:apr-0:1.4.8-3.el7_4.1.x86_64", "7Client-7.4.Z:apr-debuginfo-0:1.4.8-3.el7_4.1.aarch64", "7Client-7.4.Z:apr-debuginfo-0:1.4.8-3.el7_4.1.i686", "7Client-7.4.Z:apr-debuginfo-0:1.4.8-3.el7_4.1.ppc", "7Client-7.4.Z:apr-debuginfo-0:1.4.8-3.el7_4.1.ppc64", "7Client-7.4.Z:apr-debuginfo-0:1.4.8-3.el7_4.1.ppc64le", "7Client-7.4.Z:apr-debuginfo-0:1.4.8-3.el7_4.1.s390", "7Client-7.4.Z:apr-debuginfo-0:1.4.8-3.el7_4.1.s390x", "7Client-7.4.Z:apr-debuginfo-0:1.4.8-3.el7_4.1.x86_64", "7Client-7.4.Z:apr-devel-0:1.4.8-3.el7_4.1.aarch64", "7Client-7.4.Z:apr-devel-0:1.4.8-3.el7_4.1.i686", "7Client-7.4.Z:apr-devel-0:1.4.8-3.el7_4.1.ppc", "7Client-7.4.Z:apr-devel-0:1.4.8-3.el7_4.1.ppc64", "7Client-7.4.Z:apr-devel-0:1.4.8-3.el7_4.1.ppc64le", "7Client-7.4.Z:apr-devel-0:1.4.8-3.el7_4.1.s390", "7Client-7.4.Z:apr-devel-0:1.4.8-3.el7_4.1.s390x", "7Client-7.4.Z:apr-devel-0:1.4.8-3.el7_4.1.x86_64", "7Client-optional-7.4.Z:apr-0:1.4.8-3.el7_4.1.aarch64", "7Client-optional-7.4.Z:apr-0:1.4.8-3.el7_4.1.i686", "7Client-optional-7.4.Z:apr-0:1.4.8-3.el7_4.1.ppc", "7Client-optional-7.4.Z:apr-0:1.4.8-3.el7_4.1.ppc64", "7Client-optional-7.4.Z:apr-0:1.4.8-3.el7_4.1.ppc64le", "7Client-optional-7.4.Z:apr-0:1.4.8-3.el7_4.1.s390", "7Client-optional-7.4.Z:apr-0:1.4.8-3.el7_4.1.s390x", "7Client-optional-7.4.Z:apr-0:1.4.8-3.el7_4.1.src", "7Client-optional-7.4.Z:apr-0:1.4.8-3.el7_4.1.x86_64", "7Client-optional-7.4.Z:apr-debuginfo-0:1.4.8-3.el7_4.1.aarch64", "7Client-optional-7.4.Z:apr-debuginfo-0:1.4.8-3.el7_4.1.i686", "7Client-optional-7.4.Z:apr-debuginfo-0:1.4.8-3.el7_4.1.ppc", "7Client-optional-7.4.Z:apr-debuginfo-0:1.4.8-3.el7_4.1.ppc64", "7Client-optional-7.4.Z:apr-debuginfo-0:1.4.8-3.el7_4.1.ppc64le", "7Client-optional-7.4.Z:apr-debuginfo-0:1.4.8-3.el7_4.1.s390", "7Client-optional-7.4.Z:apr-debuginfo-0:1.4.8-3.el7_4.1.s390x", "7Client-optional-7.4.Z:apr-debuginfo-0:1.4.8-3.el7_4.1.x86_64", "7Client-optional-7.4.Z:apr-devel-0:1.4.8-3.el7_4.1.aarch64", "7Client-optional-7.4.Z:apr-devel-0:1.4.8-3.el7_4.1.i686", "7Client-optional-7.4.Z:apr-devel-0:1.4.8-3.el7_4.1.ppc", "7Client-optional-7.4.Z:apr-devel-0:1.4.8-3.el7_4.1.ppc64", "7Client-optional-7.4.Z:apr-devel-0:1.4.8-3.el7_4.1.ppc64le", "7Client-optional-7.4.Z:apr-devel-0:1.4.8-3.el7_4.1.s390", "7Client-optional-7.4.Z:apr-devel-0:1.4.8-3.el7_4.1.s390x", "7Client-optional-7.4.Z:apr-devel-0:1.4.8-3.el7_4.1.x86_64", "7ComputeNode-optional-7.4.Z:apr-0:1.4.8-3.el7_4.1.aarch64", "7ComputeNode-optional-7.4.Z:apr-0:1.4.8-3.el7_4.1.i686", "7ComputeNode-optional-7.4.Z:apr-0:1.4.8-3.el7_4.1.ppc", "7ComputeNode-optional-7.4.Z:apr-0:1.4.8-3.el7_4.1.ppc64", "7ComputeNode-optional-7.4.Z:apr-0:1.4.8-3.el7_4.1.ppc64le", "7ComputeNode-optional-7.4.Z:apr-0:1.4.8-3.el7_4.1.s390", "7ComputeNode-optional-7.4.Z:apr-0:1.4.8-3.el7_4.1.s390x", "7ComputeNode-optional-7.4.Z:apr-0:1.4.8-3.el7_4.1.src", "7ComputeNode-optional-7.4.Z:apr-0:1.4.8-3.el7_4.1.x86_64", "7ComputeNode-optional-7.4.Z:apr-debuginfo-0:1.4.8-3.el7_4.1.aarch64", "7ComputeNode-optional-7.4.Z:apr-debuginfo-0:1.4.8-3.el7_4.1.i686", "7ComputeNode-optional-7.4.Z:apr-debuginfo-0:1.4.8-3.el7_4.1.ppc", "7ComputeNode-optional-7.4.Z:apr-debuginfo-0:1.4.8-3.el7_4.1.ppc64", "7ComputeNode-optional-7.4.Z:apr-debuginfo-0:1.4.8-3.el7_4.1.ppc64le", "7ComputeNode-optional-7.4.Z:apr-debuginfo-0:1.4.8-3.el7_4.1.s390", "7ComputeNode-optional-7.4.Z:apr-debuginfo-0:1.4.8-3.el7_4.1.s390x", "7ComputeNode-optional-7.4.Z:apr-debuginfo-0:1.4.8-3.el7_4.1.x86_64", "7ComputeNode-optional-7.4.Z:apr-devel-0:1.4.8-3.el7_4.1.aarch64", "7ComputeNode-optional-7.4.Z:apr-devel-0:1.4.8-3.el7_4.1.i686", "7ComputeNode-optional-7.4.Z:apr-devel-0:1.4.8-3.el7_4.1.ppc", "7ComputeNode-optional-7.4.Z:apr-devel-0:1.4.8-3.el7_4.1.ppc64", "7ComputeNode-optional-7.4.Z:apr-devel-0:1.4.8-3.el7_4.1.ppc64le", "7ComputeNode-optional-7.4.Z:apr-devel-0:1.4.8-3.el7_4.1.s390", "7ComputeNode-optional-7.4.Z:apr-devel-0:1.4.8-3.el7_4.1.s390x", "7ComputeNode-optional-7.4.Z:apr-devel-0:1.4.8-3.el7_4.1.x86_64", "7Server-7.4.Z:apr-0:1.4.8-3.el7_4.1.aarch64", "7Server-7.4.Z:apr-0:1.4.8-3.el7_4.1.i686", "7Server-7.4.Z:apr-0:1.4.8-3.el7_4.1.ppc", "7Server-7.4.Z:apr-0:1.4.8-3.el7_4.1.ppc64", "7Server-7.4.Z:apr-0:1.4.8-3.el7_4.1.ppc64le", "7Server-7.4.Z:apr-0:1.4.8-3.el7_4.1.s390", "7Server-7.4.Z:apr-0:1.4.8-3.el7_4.1.s390x", "7Server-7.4.Z:apr-0:1.4.8-3.el7_4.1.src", "7Server-7.4.Z:apr-0:1.4.8-3.el7_4.1.x86_64", "7Server-7.4.Z:apr-debuginfo-0:1.4.8-3.el7_4.1.aarch64", "7Server-7.4.Z:apr-debuginfo-0:1.4.8-3.el7_4.1.i686", "7Server-7.4.Z:apr-debuginfo-0:1.4.8-3.el7_4.1.ppc", "7Server-7.4.Z:apr-debuginfo-0:1.4.8-3.el7_4.1.ppc64", "7Server-7.4.Z:apr-debuginfo-0:1.4.8-3.el7_4.1.ppc64le", "7Server-7.4.Z:apr-debuginfo-0:1.4.8-3.el7_4.1.s390", "7Server-7.4.Z:apr-debuginfo-0:1.4.8-3.el7_4.1.s390x", "7Server-7.4.Z:apr-debuginfo-0:1.4.8-3.el7_4.1.x86_64", "7Server-7.4.Z:apr-devel-0:1.4.8-3.el7_4.1.aarch64", "7Server-7.4.Z:apr-devel-0:1.4.8-3.el7_4.1.i686", "7Server-7.4.Z:apr-devel-0:1.4.8-3.el7_4.1.ppc", "7Server-7.4.Z:apr-devel-0:1.4.8-3.el7_4.1.ppc64", "7Server-7.4.Z:apr-devel-0:1.4.8-3.el7_4.1.ppc64le", "7Server-7.4.Z:apr-devel-0:1.4.8-3.el7_4.1.s390", "7Server-7.4.Z:apr-devel-0:1.4.8-3.el7_4.1.s390x", "7Server-7.4.Z:apr-devel-0:1.4.8-3.el7_4.1.x86_64", "7Server-Alt-7.4.Z:apr-0:1.4.8-3.el7_4.1.aarch64", "7Server-Alt-7.4.Z:apr-0:1.4.8-3.el7_4.1.i686", "7Server-Alt-7.4.Z:apr-0:1.4.8-3.el7_4.1.ppc", "7Server-Alt-7.4.Z:apr-0:1.4.8-3.el7_4.1.ppc64", "7Server-Alt-7.4.Z:apr-0:1.4.8-3.el7_4.1.ppc64le", "7Server-Alt-7.4.Z:apr-0:1.4.8-3.el7_4.1.s390", "7Server-Alt-7.4.Z:apr-0:1.4.8-3.el7_4.1.s390x", "7Server-Alt-7.4.Z:apr-0:1.4.8-3.el7_4.1.src", "7Server-Alt-7.4.Z:apr-0:1.4.8-3.el7_4.1.x86_64", "7Server-Alt-7.4.Z:apr-debuginfo-0:1.4.8-3.el7_4.1.aarch64", "7Server-Alt-7.4.Z:apr-debuginfo-0:1.4.8-3.el7_4.1.i686", "7Server-Alt-7.4.Z:apr-debuginfo-0:1.4.8-3.el7_4.1.ppc", "7Server-Alt-7.4.Z:apr-debuginfo-0:1.4.8-3.el7_4.1.ppc64", "7Server-Alt-7.4.Z:apr-debuginfo-0:1.4.8-3.el7_4.1.ppc64le", "7Server-Alt-7.4.Z:apr-debuginfo-0:1.4.8-3.el7_4.1.s390", "7Server-Alt-7.4.Z:apr-debuginfo-0:1.4.8-3.el7_4.1.s390x", "7Server-Alt-7.4.Z:apr-debuginfo-0:1.4.8-3.el7_4.1.x86_64", "7Server-Alt-7.4.Z:apr-devel-0:1.4.8-3.el7_4.1.aarch64", "7Server-Alt-7.4.Z:apr-devel-0:1.4.8-3.el7_4.1.i686", "7Server-Alt-7.4.Z:apr-devel-0:1.4.8-3.el7_4.1.ppc", "7Server-Alt-7.4.Z:apr-devel-0:1.4.8-3.el7_4.1.ppc64", "7Server-Alt-7.4.Z:apr-devel-0:1.4.8-3.el7_4.1.ppc64le", "7Server-Alt-7.4.Z:apr-devel-0:1.4.8-3.el7_4.1.s390", "7Server-Alt-7.4.Z:apr-devel-0:1.4.8-3.el7_4.1.s390x", "7Server-Alt-7.4.Z:apr-devel-0:1.4.8-3.el7_4.1.x86_64", "7Workstation-7.4.Z:apr-0:1.4.8-3.el7_4.1.aarch64", "7Workstation-7.4.Z:apr-0:1.4.8-3.el7_4.1.i686", "7Workstation-7.4.Z:apr-0:1.4.8-3.el7_4.1.ppc", "7Workstation-7.4.Z:apr-0:1.4.8-3.el7_4.1.ppc64", "7Workstation-7.4.Z:apr-0:1.4.8-3.el7_4.1.ppc64le", "7Workstation-7.4.Z:apr-0:1.4.8-3.el7_4.1.s390", "7Workstation-7.4.Z:apr-0:1.4.8-3.el7_4.1.s390x", "7Workstation-7.4.Z:apr-0:1.4.8-3.el7_4.1.src", "7Workstation-7.4.Z:apr-0:1.4.8-3.el7_4.1.x86_64", "7Workstation-7.4.Z:apr-debuginfo-0:1.4.8-3.el7_4.1.aarch64", "7Workstation-7.4.Z:apr-debuginfo-0:1.4.8-3.el7_4.1.i686", "7Workstation-7.4.Z:apr-debuginfo-0:1.4.8-3.el7_4.1.ppc", "7Workstation-7.4.Z:apr-debuginfo-0:1.4.8-3.el7_4.1.ppc64", "7Workstation-7.4.Z:apr-debuginfo-0:1.4.8-3.el7_4.1.ppc64le", "7Workstation-7.4.Z:apr-debuginfo-0:1.4.8-3.el7_4.1.s390", "7Workstation-7.4.Z:apr-debuginfo-0:1.4.8-3.el7_4.1.s390x", "7Workstation-7.4.Z:apr-debuginfo-0:1.4.8-3.el7_4.1.x86_64", "7Workstation-7.4.Z:apr-devel-0:1.4.8-3.el7_4.1.aarch64", "7Workstation-7.4.Z:apr-devel-0:1.4.8-3.el7_4.1.i686", "7Workstation-7.4.Z:apr-devel-0:1.4.8-3.el7_4.1.ppc", "7Workstation-7.4.Z:apr-devel-0:1.4.8-3.el7_4.1.ppc64", "7Workstation-7.4.Z:apr-devel-0:1.4.8-3.el7_4.1.ppc64le", "7Workstation-7.4.Z:apr-devel-0:1.4.8-3.el7_4.1.s390", "7Workstation-7.4.Z:apr-devel-0:1.4.8-3.el7_4.1.s390x", "7Workstation-7.4.Z:apr-devel-0:1.4.8-3.el7_4.1.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "apr: Out-of-bounds array deref in apr_time_exp*() functions" } ] }
rhsa-2017_3477
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update is now available for JBoss Core Services on RHEL 6.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Red Hat JBoss Core Services is a set of supplementary software for Red Hat JBoss middleware products. This software, such as Apache HTTP Server, is common to multiple JBoss middleware products, and is packaged under Red Hat JBoss Core Services to allow for faster distribution of updates, and for a more consistent update experience.\n\nThis release of Red Hat JBoss Core Services Apache HTTP Server 2.4.23 Service Pack 3 serves as an update to Red Hat JBoss Core Services Apache HTTP Server 2.4.23 Service Pack 2, and includes bug fixes, which are documented in the Release Notes document linked to in the References. \n\nSecurity Fix(es):\n\n* An out-of-bounds array dereference was found in apr_time_exp_get(). An attacker could abuse an unvalidated usage of this function to cause a denial of service or potentially lead to data leak. (CVE-2017-12613)\n\n* It was discovered that the use of httpd\u0027s ap_get_basic_auth_pw() API function outside of the authentication phase could lead to authentication bypass. A remote attacker could possibly use this flaw to bypass required authentication if the API was used incorrectly by one of the modules used by httpd. (CVE-2017-3167)\n\n* A NULL pointer dereference flaw was found in the httpd\u0027s mod_ssl module. A remote attacker could use this flaw to cause an httpd child process to crash if another module used by httpd called a certain API function during the processing of an HTTPS request. (CVE-2017-3169)\n\n* A buffer over-read flaw was found in the httpd\u0027s mod_mime module. A user permitted to modify httpd\u0027s MIME configuration could use this flaw to cause httpd child process to crash. (CVE-2017-7679)\n\n* A use-after-free flaw was found in the way httpd handled invalid and previously unregistered HTTP methods specified in the Limit directive used in an .htaccess file. A remote attacker could possibly use this flaw to disclose portions of the server memory, or cause httpd child process to crash. (CVE-2017-9798)\n\nRed Hat would like to thank Hanno B\u00f6ck for reporting CVE-2017-9798.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2017:3477", "url": "https://access.redhat.com/errata/RHSA-2017:3477" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "https://access.redhat.com/documentation/en/red-hat-jboss-core-services/", "url": "https://access.redhat.com/documentation/en/red-hat-jboss-core-services/" }, { "category": "external", "summary": "1463194", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1463194" }, { "category": "external", "summary": "1463197", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1463197" }, { "category": "external", "summary": "1463207", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1463207" }, { "category": "external", "summary": "1490344", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1490344" }, { "category": "external", "summary": "1506523", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1506523" }, { "category": "external", "summary": "JBCS-403", "url": "https://issues.redhat.com/browse/JBCS-403" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2017/rhsa-2017_3477.json" } ], "title": "Red Hat Security Advisory: Red Hat JBoss Core Services Apache HTTP Server 2.4.23 security update", "tracking": { "current_release_date": "2024-11-14T23:39:50+00:00", "generator": { "date": "2024-11-14T23:39:50+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2017:3477", "initial_release_date": "2017-12-15T22:34:40+00:00", "revision_history": [ { "date": "2017-12-15T22:34:40+00:00", "number": "1", "summary": "Initial version" }, { "date": "2017-12-15T22:34:40+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-14T23:39:50+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat JBoss Core Services on RHEL 6 Server", "product": { "name": "Red Hat JBoss Core Services on RHEL 6 Server", "product_id": "6Server-JBCS", "product_identification_helper": { "cpe": "cpe:/a:redhat:jboss_core_services:1::el6" } } } ], "category": "product_family", "name": "Red Hat JBoss Core Services" }, { "branches": [ { "category": "product_version", "name": "jbcs-httpd24-mod_session-0:2.4.23-125.jbcs.el6.x86_64", "product": { "name": "jbcs-httpd24-mod_session-0:2.4.23-125.jbcs.el6.x86_64", "product_id": "jbcs-httpd24-mod_session-0:2.4.23-125.jbcs.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_session@2.4.23-125.jbcs.el6?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-httpd-0:2.4.23-125.jbcs.el6.x86_64", "product": { "name": "jbcs-httpd24-httpd-0:2.4.23-125.jbcs.el6.x86_64", "product_id": "jbcs-httpd24-httpd-0:2.4.23-125.jbcs.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-httpd@2.4.23-125.jbcs.el6?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_ssl-1:2.4.23-125.jbcs.el6.x86_64", "product": { "name": "jbcs-httpd24-mod_ssl-1:2.4.23-125.jbcs.el6.x86_64", "product_id": "jbcs-httpd24-mod_ssl-1:2.4.23-125.jbcs.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_ssl@2.4.23-125.jbcs.el6?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "jbcs-httpd24-httpd-selinux-0:2.4.23-125.jbcs.el6.x86_64", "product": { "name": "jbcs-httpd24-httpd-selinux-0:2.4.23-125.jbcs.el6.x86_64", "product_id": "jbcs-httpd24-httpd-selinux-0:2.4.23-125.jbcs.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-httpd-selinux@2.4.23-125.jbcs.el6?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-httpd-libs-0:2.4.23-125.jbcs.el6.x86_64", "product": { "name": "jbcs-httpd24-httpd-libs-0:2.4.23-125.jbcs.el6.x86_64", "product_id": "jbcs-httpd24-httpd-libs-0:2.4.23-125.jbcs.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-httpd-libs@2.4.23-125.jbcs.el6?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_proxy_html-1:2.4.23-125.jbcs.el6.x86_64", "product": { "name": "jbcs-httpd24-mod_proxy_html-1:2.4.23-125.jbcs.el6.x86_64", "product_id": "jbcs-httpd24-mod_proxy_html-1:2.4.23-125.jbcs.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_proxy_html@2.4.23-125.jbcs.el6?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "jbcs-httpd24-httpd-debuginfo-0:2.4.23-125.jbcs.el6.x86_64", "product": { "name": "jbcs-httpd24-httpd-debuginfo-0:2.4.23-125.jbcs.el6.x86_64", "product_id": "jbcs-httpd24-httpd-debuginfo-0:2.4.23-125.jbcs.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-httpd-debuginfo@2.4.23-125.jbcs.el6?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-httpd-tools-0:2.4.23-125.jbcs.el6.x86_64", "product": { "name": "jbcs-httpd24-httpd-tools-0:2.4.23-125.jbcs.el6.x86_64", "product_id": "jbcs-httpd24-httpd-tools-0:2.4.23-125.jbcs.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-httpd-tools@2.4.23-125.jbcs.el6?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_ldap-0:2.4.23-125.jbcs.el6.x86_64", "product": { "name": "jbcs-httpd24-mod_ldap-0:2.4.23-125.jbcs.el6.x86_64", "product_id": "jbcs-httpd24-mod_ldap-0:2.4.23-125.jbcs.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_ldap@2.4.23-125.jbcs.el6?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-httpd-devel-0:2.4.23-125.jbcs.el6.x86_64", "product": { "name": "jbcs-httpd24-httpd-devel-0:2.4.23-125.jbcs.el6.x86_64", "product_id": "jbcs-httpd24-httpd-devel-0:2.4.23-125.jbcs.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-httpd-devel@2.4.23-125.jbcs.el6?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_bmx-0:0.9.6-15.GA.jbcs.el6.x86_64", "product": { "name": "jbcs-httpd24-mod_bmx-0:0.9.6-15.GA.jbcs.el6.x86_64", "product_id": "jbcs-httpd24-mod_bmx-0:0.9.6-15.GA.jbcs.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_bmx@0.9.6-15.GA.jbcs.el6?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_bmx-debuginfo-0:0.9.6-15.GA.jbcs.el6.x86_64", "product": { "name": "jbcs-httpd24-mod_bmx-debuginfo-0:0.9.6-15.GA.jbcs.el6.x86_64", "product_id": "jbcs-httpd24-mod_bmx-debuginfo-0:0.9.6-15.GA.jbcs.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_bmx-debuginfo@0.9.6-15.GA.jbcs.el6?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_cluster-native-0:1.3.8-1.Final_redhat_1.jbcs.el6.x86_64", "product": { "name": "jbcs-httpd24-mod_cluster-native-0:1.3.8-1.Final_redhat_1.jbcs.el6.x86_64", "product_id": "jbcs-httpd24-mod_cluster-native-0:1.3.8-1.Final_redhat_1.jbcs.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_cluster-native@1.3.8-1.Final_redhat_1.jbcs.el6?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.8-1.Final_redhat_1.jbcs.el6.x86_64", "product": { "name": "jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.8-1.Final_redhat_1.jbcs.el6.x86_64", "product_id": "jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.8-1.Final_redhat_1.jbcs.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_cluster-native-debuginfo@1.3.8-1.Final_redhat_1.jbcs.el6?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "jbcs-httpd24-mod_session-0:2.4.23-125.jbcs.el6.i686", "product": { "name": "jbcs-httpd24-mod_session-0:2.4.23-125.jbcs.el6.i686", "product_id": "jbcs-httpd24-mod_session-0:2.4.23-125.jbcs.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_session@2.4.23-125.jbcs.el6?arch=i686" } } }, { "category": "product_version", "name": "jbcs-httpd24-httpd-0:2.4.23-125.jbcs.el6.i686", "product": { "name": "jbcs-httpd24-httpd-0:2.4.23-125.jbcs.el6.i686", "product_id": "jbcs-httpd24-httpd-0:2.4.23-125.jbcs.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-httpd@2.4.23-125.jbcs.el6?arch=i686" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_ssl-1:2.4.23-125.jbcs.el6.i686", "product": { "name": "jbcs-httpd24-mod_ssl-1:2.4.23-125.jbcs.el6.i686", "product_id": "jbcs-httpd24-mod_ssl-1:2.4.23-125.jbcs.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_ssl@2.4.23-125.jbcs.el6?arch=i686\u0026epoch=1" } } }, { "category": "product_version", "name": "jbcs-httpd24-httpd-selinux-0:2.4.23-125.jbcs.el6.i686", "product": { "name": "jbcs-httpd24-httpd-selinux-0:2.4.23-125.jbcs.el6.i686", "product_id": "jbcs-httpd24-httpd-selinux-0:2.4.23-125.jbcs.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-httpd-selinux@2.4.23-125.jbcs.el6?arch=i686" } } }, { "category": "product_version", "name": "jbcs-httpd24-httpd-libs-0:2.4.23-125.jbcs.el6.i686", "product": { "name": "jbcs-httpd24-httpd-libs-0:2.4.23-125.jbcs.el6.i686", "product_id": "jbcs-httpd24-httpd-libs-0:2.4.23-125.jbcs.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-httpd-libs@2.4.23-125.jbcs.el6?arch=i686" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_proxy_html-1:2.4.23-125.jbcs.el6.i686", "product": { "name": "jbcs-httpd24-mod_proxy_html-1:2.4.23-125.jbcs.el6.i686", "product_id": "jbcs-httpd24-mod_proxy_html-1:2.4.23-125.jbcs.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_proxy_html@2.4.23-125.jbcs.el6?arch=i686\u0026epoch=1" } } }, { "category": "product_version", "name": "jbcs-httpd24-httpd-debuginfo-0:2.4.23-125.jbcs.el6.i686", "product": { "name": "jbcs-httpd24-httpd-debuginfo-0:2.4.23-125.jbcs.el6.i686", "product_id": "jbcs-httpd24-httpd-debuginfo-0:2.4.23-125.jbcs.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-httpd-debuginfo@2.4.23-125.jbcs.el6?arch=i686" } } }, { "category": "product_version", "name": "jbcs-httpd24-httpd-tools-0:2.4.23-125.jbcs.el6.i686", "product": { "name": "jbcs-httpd24-httpd-tools-0:2.4.23-125.jbcs.el6.i686", "product_id": "jbcs-httpd24-httpd-tools-0:2.4.23-125.jbcs.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-httpd-tools@2.4.23-125.jbcs.el6?arch=i686" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_ldap-0:2.4.23-125.jbcs.el6.i686", "product": { "name": "jbcs-httpd24-mod_ldap-0:2.4.23-125.jbcs.el6.i686", "product_id": "jbcs-httpd24-mod_ldap-0:2.4.23-125.jbcs.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_ldap@2.4.23-125.jbcs.el6?arch=i686" } } }, { "category": "product_version", "name": "jbcs-httpd24-httpd-devel-0:2.4.23-125.jbcs.el6.i686", "product": { "name": "jbcs-httpd24-httpd-devel-0:2.4.23-125.jbcs.el6.i686", "product_id": "jbcs-httpd24-httpd-devel-0:2.4.23-125.jbcs.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-httpd-devel@2.4.23-125.jbcs.el6?arch=i686" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_bmx-0:0.9.6-15.GA.jbcs.el6.i686", "product": { "name": "jbcs-httpd24-mod_bmx-0:0.9.6-15.GA.jbcs.el6.i686", "product_id": "jbcs-httpd24-mod_bmx-0:0.9.6-15.GA.jbcs.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_bmx@0.9.6-15.GA.jbcs.el6?arch=i686" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_bmx-debuginfo-0:0.9.6-15.GA.jbcs.el6.i686", "product": { "name": "jbcs-httpd24-mod_bmx-debuginfo-0:0.9.6-15.GA.jbcs.el6.i686", "product_id": "jbcs-httpd24-mod_bmx-debuginfo-0:0.9.6-15.GA.jbcs.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_bmx-debuginfo@0.9.6-15.GA.jbcs.el6?arch=i686" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_cluster-native-0:1.3.8-1.Final_redhat_1.jbcs.el6.i686", "product": { "name": "jbcs-httpd24-mod_cluster-native-0:1.3.8-1.Final_redhat_1.jbcs.el6.i686", "product_id": "jbcs-httpd24-mod_cluster-native-0:1.3.8-1.Final_redhat_1.jbcs.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_cluster-native@1.3.8-1.Final_redhat_1.jbcs.el6?arch=i686" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.8-1.Final_redhat_1.jbcs.el6.i686", "product": { "name": "jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.8-1.Final_redhat_1.jbcs.el6.i686", "product_id": "jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.8-1.Final_redhat_1.jbcs.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_cluster-native-debuginfo@1.3.8-1.Final_redhat_1.jbcs.el6?arch=i686" } } } ], "category": "architecture", "name": "i686" }, { "branches": [ { "category": "product_version", "name": "jbcs-httpd24-httpd-0:2.4.23-125.jbcs.el6.src", "product": { "name": "jbcs-httpd24-httpd-0:2.4.23-125.jbcs.el6.src", "product_id": "jbcs-httpd24-httpd-0:2.4.23-125.jbcs.el6.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-httpd@2.4.23-125.jbcs.el6?arch=src" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_bmx-0:0.9.6-15.GA.jbcs.el6.src", "product": { "name": "jbcs-httpd24-mod_bmx-0:0.9.6-15.GA.jbcs.el6.src", "product_id": "jbcs-httpd24-mod_bmx-0:0.9.6-15.GA.jbcs.el6.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_bmx@0.9.6-15.GA.jbcs.el6?arch=src" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_cluster-native-0:1.3.8-1.Final_redhat_1.jbcs.el6.src", "product": { "name": "jbcs-httpd24-mod_cluster-native-0:1.3.8-1.Final_redhat_1.jbcs.el6.src", "product_id": "jbcs-httpd24-mod_cluster-native-0:1.3.8-1.Final_redhat_1.jbcs.el6.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_cluster-native@1.3.8-1.Final_redhat_1.jbcs.el6?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "jbcs-httpd24-httpd-manual-0:2.4.23-125.jbcs.el6.noarch", "product": { "name": "jbcs-httpd24-httpd-manual-0:2.4.23-125.jbcs.el6.noarch", "product_id": "jbcs-httpd24-httpd-manual-0:2.4.23-125.jbcs.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-httpd-manual@2.4.23-125.jbcs.el6?arch=noarch" } } } ], "category": "architecture", "name": "noarch" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-httpd-0:2.4.23-125.jbcs.el6.i686 as a component of Red Hat JBoss Core Services on RHEL 6 Server", "product_id": "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-125.jbcs.el6.i686" }, "product_reference": "jbcs-httpd24-httpd-0:2.4.23-125.jbcs.el6.i686", "relates_to_product_reference": "6Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-httpd-0:2.4.23-125.jbcs.el6.src as a component of Red Hat JBoss Core Services on RHEL 6 Server", "product_id": "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-125.jbcs.el6.src" }, "product_reference": "jbcs-httpd24-httpd-0:2.4.23-125.jbcs.el6.src", "relates_to_product_reference": "6Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-httpd-0:2.4.23-125.jbcs.el6.x86_64 as a component of Red Hat JBoss Core Services on RHEL 6 Server", "product_id": "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-125.jbcs.el6.x86_64" }, "product_reference": "jbcs-httpd24-httpd-0:2.4.23-125.jbcs.el6.x86_64", "relates_to_product_reference": "6Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-httpd-debuginfo-0:2.4.23-125.jbcs.el6.i686 as a component of Red Hat JBoss Core Services on RHEL 6 Server", "product_id": "6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.23-125.jbcs.el6.i686" }, "product_reference": "jbcs-httpd24-httpd-debuginfo-0:2.4.23-125.jbcs.el6.i686", "relates_to_product_reference": "6Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-httpd-debuginfo-0:2.4.23-125.jbcs.el6.x86_64 as a component of Red Hat JBoss Core Services on RHEL 6 Server", "product_id": "6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.23-125.jbcs.el6.x86_64" }, "product_reference": "jbcs-httpd24-httpd-debuginfo-0:2.4.23-125.jbcs.el6.x86_64", "relates_to_product_reference": "6Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-httpd-devel-0:2.4.23-125.jbcs.el6.i686 as a component of Red Hat JBoss Core Services on RHEL 6 Server", "product_id": "6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.23-125.jbcs.el6.i686" }, "product_reference": "jbcs-httpd24-httpd-devel-0:2.4.23-125.jbcs.el6.i686", "relates_to_product_reference": "6Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-httpd-devel-0:2.4.23-125.jbcs.el6.x86_64 as a component of Red Hat JBoss Core Services on RHEL 6 Server", "product_id": "6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.23-125.jbcs.el6.x86_64" }, "product_reference": "jbcs-httpd24-httpd-devel-0:2.4.23-125.jbcs.el6.x86_64", "relates_to_product_reference": "6Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-httpd-libs-0:2.4.23-125.jbcs.el6.i686 as a component of Red Hat JBoss Core Services on RHEL 6 Server", "product_id": "6Server-JBCS:jbcs-httpd24-httpd-libs-0:2.4.23-125.jbcs.el6.i686" }, "product_reference": "jbcs-httpd24-httpd-libs-0:2.4.23-125.jbcs.el6.i686", "relates_to_product_reference": "6Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-httpd-libs-0:2.4.23-125.jbcs.el6.x86_64 as a component of Red Hat JBoss Core Services on RHEL 6 Server", "product_id": "6Server-JBCS:jbcs-httpd24-httpd-libs-0:2.4.23-125.jbcs.el6.x86_64" }, "product_reference": "jbcs-httpd24-httpd-libs-0:2.4.23-125.jbcs.el6.x86_64", "relates_to_product_reference": "6Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-httpd-manual-0:2.4.23-125.jbcs.el6.noarch as a component of Red Hat JBoss Core Services on RHEL 6 Server", "product_id": "6Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.23-125.jbcs.el6.noarch" }, "product_reference": "jbcs-httpd24-httpd-manual-0:2.4.23-125.jbcs.el6.noarch", "relates_to_product_reference": "6Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-httpd-selinux-0:2.4.23-125.jbcs.el6.i686 as a component of Red Hat JBoss Core Services on RHEL 6 Server", "product_id": "6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.23-125.jbcs.el6.i686" }, "product_reference": "jbcs-httpd24-httpd-selinux-0:2.4.23-125.jbcs.el6.i686", "relates_to_product_reference": "6Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-httpd-selinux-0:2.4.23-125.jbcs.el6.x86_64 as a component of Red Hat JBoss Core Services on RHEL 6 Server", "product_id": "6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.23-125.jbcs.el6.x86_64" }, "product_reference": "jbcs-httpd24-httpd-selinux-0:2.4.23-125.jbcs.el6.x86_64", "relates_to_product_reference": "6Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-httpd-tools-0:2.4.23-125.jbcs.el6.i686 as a component of Red Hat JBoss Core Services on RHEL 6 Server", "product_id": "6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.23-125.jbcs.el6.i686" }, "product_reference": "jbcs-httpd24-httpd-tools-0:2.4.23-125.jbcs.el6.i686", "relates_to_product_reference": "6Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-httpd-tools-0:2.4.23-125.jbcs.el6.x86_64 as a component of Red Hat JBoss Core Services on RHEL 6 Server", "product_id": "6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.23-125.jbcs.el6.x86_64" }, "product_reference": "jbcs-httpd24-httpd-tools-0:2.4.23-125.jbcs.el6.x86_64", "relates_to_product_reference": "6Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_bmx-0:0.9.6-15.GA.jbcs.el6.i686 as a component of Red Hat JBoss Core Services on RHEL 6 Server", "product_id": "6Server-JBCS:jbcs-httpd24-mod_bmx-0:0.9.6-15.GA.jbcs.el6.i686" }, "product_reference": "jbcs-httpd24-mod_bmx-0:0.9.6-15.GA.jbcs.el6.i686", "relates_to_product_reference": "6Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_bmx-0:0.9.6-15.GA.jbcs.el6.src as a component of Red Hat JBoss Core Services on RHEL 6 Server", "product_id": "6Server-JBCS:jbcs-httpd24-mod_bmx-0:0.9.6-15.GA.jbcs.el6.src" }, "product_reference": "jbcs-httpd24-mod_bmx-0:0.9.6-15.GA.jbcs.el6.src", "relates_to_product_reference": "6Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_bmx-0:0.9.6-15.GA.jbcs.el6.x86_64 as a component of Red Hat JBoss Core Services on RHEL 6 Server", "product_id": "6Server-JBCS:jbcs-httpd24-mod_bmx-0:0.9.6-15.GA.jbcs.el6.x86_64" }, "product_reference": "jbcs-httpd24-mod_bmx-0:0.9.6-15.GA.jbcs.el6.x86_64", "relates_to_product_reference": "6Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_bmx-debuginfo-0:0.9.6-15.GA.jbcs.el6.i686 as a component of Red Hat JBoss Core Services on RHEL 6 Server", "product_id": "6Server-JBCS:jbcs-httpd24-mod_bmx-debuginfo-0:0.9.6-15.GA.jbcs.el6.i686" }, "product_reference": "jbcs-httpd24-mod_bmx-debuginfo-0:0.9.6-15.GA.jbcs.el6.i686", "relates_to_product_reference": "6Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_bmx-debuginfo-0:0.9.6-15.GA.jbcs.el6.x86_64 as a component of Red Hat JBoss Core Services on RHEL 6 Server", "product_id": "6Server-JBCS:jbcs-httpd24-mod_bmx-debuginfo-0:0.9.6-15.GA.jbcs.el6.x86_64" }, "product_reference": "jbcs-httpd24-mod_bmx-debuginfo-0:0.9.6-15.GA.jbcs.el6.x86_64", "relates_to_product_reference": "6Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_cluster-native-0:1.3.8-1.Final_redhat_1.jbcs.el6.i686 as a component of Red Hat JBoss Core Services on RHEL 6 Server", "product_id": "6Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.8-1.Final_redhat_1.jbcs.el6.i686" }, "product_reference": "jbcs-httpd24-mod_cluster-native-0:1.3.8-1.Final_redhat_1.jbcs.el6.i686", "relates_to_product_reference": "6Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_cluster-native-0:1.3.8-1.Final_redhat_1.jbcs.el6.src as a component of Red Hat JBoss Core Services on RHEL 6 Server", "product_id": "6Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.8-1.Final_redhat_1.jbcs.el6.src" }, "product_reference": "jbcs-httpd24-mod_cluster-native-0:1.3.8-1.Final_redhat_1.jbcs.el6.src", "relates_to_product_reference": "6Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_cluster-native-0:1.3.8-1.Final_redhat_1.jbcs.el6.x86_64 as a component of Red Hat JBoss Core Services on RHEL 6 Server", "product_id": "6Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.8-1.Final_redhat_1.jbcs.el6.x86_64" }, "product_reference": "jbcs-httpd24-mod_cluster-native-0:1.3.8-1.Final_redhat_1.jbcs.el6.x86_64", "relates_to_product_reference": "6Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.8-1.Final_redhat_1.jbcs.el6.i686 as a component of Red Hat JBoss Core Services on RHEL 6 Server", "product_id": "6Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.8-1.Final_redhat_1.jbcs.el6.i686" }, "product_reference": "jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.8-1.Final_redhat_1.jbcs.el6.i686", "relates_to_product_reference": "6Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.8-1.Final_redhat_1.jbcs.el6.x86_64 as a component of Red Hat JBoss Core Services on RHEL 6 Server", "product_id": "6Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.8-1.Final_redhat_1.jbcs.el6.x86_64" }, "product_reference": "jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.8-1.Final_redhat_1.jbcs.el6.x86_64", "relates_to_product_reference": "6Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_ldap-0:2.4.23-125.jbcs.el6.i686 as a component of Red Hat JBoss Core Services on RHEL 6 Server", "product_id": "6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.23-125.jbcs.el6.i686" }, "product_reference": "jbcs-httpd24-mod_ldap-0:2.4.23-125.jbcs.el6.i686", "relates_to_product_reference": "6Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_ldap-0:2.4.23-125.jbcs.el6.x86_64 as a component of Red Hat JBoss Core Services on RHEL 6 Server", "product_id": "6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.23-125.jbcs.el6.x86_64" }, "product_reference": "jbcs-httpd24-mod_ldap-0:2.4.23-125.jbcs.el6.x86_64", "relates_to_product_reference": "6Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_proxy_html-1:2.4.23-125.jbcs.el6.i686 as a component of Red Hat JBoss Core Services on RHEL 6 Server", "product_id": "6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.23-125.jbcs.el6.i686" }, "product_reference": "jbcs-httpd24-mod_proxy_html-1:2.4.23-125.jbcs.el6.i686", "relates_to_product_reference": "6Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_proxy_html-1:2.4.23-125.jbcs.el6.x86_64 as a component of Red Hat JBoss Core Services on RHEL 6 Server", "product_id": "6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.23-125.jbcs.el6.x86_64" }, "product_reference": "jbcs-httpd24-mod_proxy_html-1:2.4.23-125.jbcs.el6.x86_64", "relates_to_product_reference": "6Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_session-0:2.4.23-125.jbcs.el6.i686 as a component of Red Hat JBoss Core Services on RHEL 6 Server", "product_id": "6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.23-125.jbcs.el6.i686" }, "product_reference": "jbcs-httpd24-mod_session-0:2.4.23-125.jbcs.el6.i686", "relates_to_product_reference": "6Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_session-0:2.4.23-125.jbcs.el6.x86_64 as a component of Red Hat JBoss Core Services on RHEL 6 Server", "product_id": "6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.23-125.jbcs.el6.x86_64" }, "product_reference": "jbcs-httpd24-mod_session-0:2.4.23-125.jbcs.el6.x86_64", "relates_to_product_reference": "6Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_ssl-1:2.4.23-125.jbcs.el6.i686 as a component of Red Hat JBoss Core Services on RHEL 6 Server", "product_id": "6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.23-125.jbcs.el6.i686" }, "product_reference": "jbcs-httpd24-mod_ssl-1:2.4.23-125.jbcs.el6.i686", "relates_to_product_reference": "6Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_ssl-1:2.4.23-125.jbcs.el6.x86_64 as a component of Red Hat JBoss Core Services on RHEL 6 Server", "product_id": "6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.23-125.jbcs.el6.x86_64" }, "product_reference": "jbcs-httpd24-mod_ssl-1:2.4.23-125.jbcs.el6.x86_64", "relates_to_product_reference": "6Server-JBCS" } ] }, "vulnerabilities": [ { "cve": "CVE-2017-3167", "cwe": { "id": "CWE-287", "name": "Improper Authentication" }, "discovery_date": "2017-06-20T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1463194" } ], "notes": [ { "category": "description", "text": "It was discovered that the use of httpd\u0027s ap_get_basic_auth_pw() API function outside of the authentication phase could lead to authentication bypass. A remote attacker could possibly use this flaw to bypass required authentication if the API was used incorrectly by one of the modules used by httpd.", "title": "Vulnerability description" }, { "category": "summary", "text": "httpd: ap_get_basic_auth_pw() authentication bypass", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-125.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-125.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-125.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.23-125.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.23-125.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.23-125.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.23-125.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-libs-0:2.4.23-125.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-libs-0:2.4.23-125.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.23-125.jbcs.el6.noarch", "6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.23-125.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.23-125.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.23-125.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.23-125.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_bmx-0:0.9.6-15.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_bmx-0:0.9.6-15.GA.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_bmx-0:0.9.6-15.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_bmx-debuginfo-0:0.9.6-15.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_bmx-debuginfo-0:0.9.6-15.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.8-1.Final_redhat_1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.8-1.Final_redhat_1.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.8-1.Final_redhat_1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.8-1.Final_redhat_1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.8-1.Final_redhat_1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.23-125.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.23-125.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.23-125.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.23-125.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.23-125.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.23-125.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.23-125.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.23-125.jbcs.el6.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2017-3167" }, { "category": "external", "summary": "RHBZ#1463194", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1463194" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2017-3167", "url": "https://www.cve.org/CVERecord?id=CVE-2017-3167" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-3167", "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-3167" }, { "category": "external", "summary": "https://httpd.apache.org/security/vulnerabilities_22.html", "url": "https://httpd.apache.org/security/vulnerabilities_22.html" }, { "category": "external", "summary": "https://httpd.apache.org/security/vulnerabilities_24.html", "url": "https://httpd.apache.org/security/vulnerabilities_24.html" } ], "release_date": "2017-06-20T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2017-12-15T22:34:40+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically.", "product_ids": [ "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-125.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-125.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-125.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.23-125.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.23-125.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.23-125.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.23-125.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-libs-0:2.4.23-125.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-libs-0:2.4.23-125.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.23-125.jbcs.el6.noarch", "6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.23-125.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.23-125.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.23-125.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.23-125.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_bmx-0:0.9.6-15.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_bmx-0:0.9.6-15.GA.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_bmx-0:0.9.6-15.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_bmx-debuginfo-0:0.9.6-15.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_bmx-debuginfo-0:0.9.6-15.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.8-1.Final_redhat_1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.8-1.Final_redhat_1.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.8-1.Final_redhat_1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.8-1.Final_redhat_1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.8-1.Final_redhat_1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.23-125.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.23-125.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.23-125.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.23-125.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.23-125.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.23-125.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.23-125.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.23-125.jbcs.el6.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2017:3477" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.4, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.0" }, "products": [ "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-125.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-125.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-125.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.23-125.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.23-125.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.23-125.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.23-125.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-libs-0:2.4.23-125.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-libs-0:2.4.23-125.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.23-125.jbcs.el6.noarch", "6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.23-125.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.23-125.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.23-125.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.23-125.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_bmx-0:0.9.6-15.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_bmx-0:0.9.6-15.GA.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_bmx-0:0.9.6-15.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_bmx-debuginfo-0:0.9.6-15.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_bmx-debuginfo-0:0.9.6-15.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.8-1.Final_redhat_1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.8-1.Final_redhat_1.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.8-1.Final_redhat_1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.8-1.Final_redhat_1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.8-1.Final_redhat_1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.23-125.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.23-125.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.23-125.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.23-125.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.23-125.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.23-125.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.23-125.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.23-125.jbcs.el6.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "httpd: ap_get_basic_auth_pw() authentication bypass" }, { "cve": "CVE-2017-3169", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "discovery_date": "2017-06-20T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1463197" } ], "notes": [ { "category": "description", "text": "A NULL pointer dereference flaw was found in the httpd\u0027s mod_ssl module. A remote attacker could use this flaw to cause an httpd child process to crash if another module used by httpd called a certain API function during the processing of an HTTPS request.", "title": "Vulnerability description" }, { "category": "summary", "text": "httpd: mod_ssl NULL pointer dereference", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-125.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-125.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-125.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.23-125.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.23-125.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.23-125.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.23-125.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-libs-0:2.4.23-125.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-libs-0:2.4.23-125.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.23-125.jbcs.el6.noarch", "6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.23-125.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.23-125.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.23-125.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.23-125.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_bmx-0:0.9.6-15.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_bmx-0:0.9.6-15.GA.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_bmx-0:0.9.6-15.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_bmx-debuginfo-0:0.9.6-15.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_bmx-debuginfo-0:0.9.6-15.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.8-1.Final_redhat_1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.8-1.Final_redhat_1.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.8-1.Final_redhat_1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.8-1.Final_redhat_1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.8-1.Final_redhat_1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.23-125.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.23-125.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.23-125.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.23-125.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.23-125.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.23-125.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.23-125.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.23-125.jbcs.el6.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2017-3169" }, { "category": "external", "summary": "RHBZ#1463197", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1463197" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2017-3169", "url": "https://www.cve.org/CVERecord?id=CVE-2017-3169" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-3169", "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-3169" }, { "category": "external", "summary": "https://httpd.apache.org/security/vulnerabilities_22.html", "url": "https://httpd.apache.org/security/vulnerabilities_22.html" }, { "category": "external", "summary": "https://httpd.apache.org/security/vulnerabilities_24.html", "url": "https://httpd.apache.org/security/vulnerabilities_24.html" } ], "release_date": "2017-06-20T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2017-12-15T22:34:40+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically.", "product_ids": [ "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-125.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-125.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-125.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.23-125.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.23-125.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.23-125.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.23-125.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-libs-0:2.4.23-125.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-libs-0:2.4.23-125.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.23-125.jbcs.el6.noarch", "6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.23-125.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.23-125.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.23-125.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.23-125.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_bmx-0:0.9.6-15.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_bmx-0:0.9.6-15.GA.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_bmx-0:0.9.6-15.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_bmx-debuginfo-0:0.9.6-15.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_bmx-debuginfo-0:0.9.6-15.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.8-1.Final_redhat_1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.8-1.Final_redhat_1.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.8-1.Final_redhat_1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.8-1.Final_redhat_1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.8-1.Final_redhat_1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.23-125.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.23-125.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.23-125.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.23-125.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.23-125.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.23-125.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.23-125.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.23-125.jbcs.el6.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2017:3477" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 3.7, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-125.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-125.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-125.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.23-125.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.23-125.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.23-125.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.23-125.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-libs-0:2.4.23-125.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-libs-0:2.4.23-125.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.23-125.jbcs.el6.noarch", "6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.23-125.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.23-125.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.23-125.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.23-125.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_bmx-0:0.9.6-15.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_bmx-0:0.9.6-15.GA.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_bmx-0:0.9.6-15.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_bmx-debuginfo-0:0.9.6-15.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_bmx-debuginfo-0:0.9.6-15.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.8-1.Final_redhat_1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.8-1.Final_redhat_1.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.8-1.Final_redhat_1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.8-1.Final_redhat_1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.8-1.Final_redhat_1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.23-125.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.23-125.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.23-125.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.23-125.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.23-125.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.23-125.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.23-125.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.23-125.jbcs.el6.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "httpd: mod_ssl NULL pointer dereference" }, { "cve": "CVE-2017-7679", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "discovery_date": "2017-06-20T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1463207" } ], "notes": [ { "category": "description", "text": "A buffer over-read flaw was found in the httpd\u0027s mod_mime module. A user permitted to modify httpd\u0027s MIME configuration could use this flaw to cause httpd child process to crash.", "title": "Vulnerability description" }, { "category": "summary", "text": "httpd: mod_mime buffer overread", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-125.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-125.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-125.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.23-125.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.23-125.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.23-125.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.23-125.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-libs-0:2.4.23-125.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-libs-0:2.4.23-125.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.23-125.jbcs.el6.noarch", "6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.23-125.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.23-125.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.23-125.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.23-125.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_bmx-0:0.9.6-15.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_bmx-0:0.9.6-15.GA.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_bmx-0:0.9.6-15.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_bmx-debuginfo-0:0.9.6-15.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_bmx-debuginfo-0:0.9.6-15.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.8-1.Final_redhat_1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.8-1.Final_redhat_1.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.8-1.Final_redhat_1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.8-1.Final_redhat_1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.8-1.Final_redhat_1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.23-125.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.23-125.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.23-125.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.23-125.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.23-125.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.23-125.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.23-125.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.23-125.jbcs.el6.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2017-7679" }, { "category": "external", "summary": "RHBZ#1463207", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1463207" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2017-7679", "url": "https://www.cve.org/CVERecord?id=CVE-2017-7679" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-7679", "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-7679" }, { "category": "external", "summary": "https://httpd.apache.org/security/vulnerabilities_22.html", "url": "https://httpd.apache.org/security/vulnerabilities_22.html" }, { "category": "external", "summary": "https://httpd.apache.org/security/vulnerabilities_24.html", "url": "https://httpd.apache.org/security/vulnerabilities_24.html" } ], "release_date": "2017-06-20T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2017-12-15T22:34:40+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically.", "product_ids": [ "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-125.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-125.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-125.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.23-125.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.23-125.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.23-125.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.23-125.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-libs-0:2.4.23-125.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-libs-0:2.4.23-125.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.23-125.jbcs.el6.noarch", "6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.23-125.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.23-125.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.23-125.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.23-125.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_bmx-0:0.9.6-15.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_bmx-0:0.9.6-15.GA.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_bmx-0:0.9.6-15.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_bmx-debuginfo-0:0.9.6-15.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_bmx-debuginfo-0:0.9.6-15.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.8-1.Final_redhat_1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.8-1.Final_redhat_1.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.8-1.Final_redhat_1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.8-1.Final_redhat_1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.8-1.Final_redhat_1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.23-125.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.23-125.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.23-125.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.23-125.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.23-125.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.23-125.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.23-125.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.23-125.jbcs.el6.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2017:3477" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 3.7, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-125.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-125.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-125.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.23-125.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.23-125.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.23-125.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.23-125.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-libs-0:2.4.23-125.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-libs-0:2.4.23-125.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.23-125.jbcs.el6.noarch", "6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.23-125.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.23-125.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.23-125.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.23-125.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_bmx-0:0.9.6-15.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_bmx-0:0.9.6-15.GA.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_bmx-0:0.9.6-15.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_bmx-debuginfo-0:0.9.6-15.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_bmx-debuginfo-0:0.9.6-15.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.8-1.Final_redhat_1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.8-1.Final_redhat_1.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.8-1.Final_redhat_1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.8-1.Final_redhat_1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.8-1.Final_redhat_1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.23-125.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.23-125.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.23-125.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.23-125.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.23-125.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.23-125.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.23-125.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.23-125.jbcs.el6.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "httpd: mod_mime buffer overread" }, { "acknowledgments": [ { "names": [ "Hanno B\u00f6ck" ] } ], "cve": "CVE-2017-9798", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2017-09-11T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1490344" } ], "notes": [ { "category": "description", "text": "A use-after-free flaw was found in the way httpd handled invalid and previously unregistered HTTP methods specified in the Limit directive used in an .htaccess file. A remote attacker could possibly use this flaw to disclose portions of the server memory, or cause httpd child process to crash.", "title": "Vulnerability description" }, { "category": "summary", "text": "httpd: Use-after-free by limiting unregistered HTTP method (Optionsbleed)", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue affects the versions of httpd as shipped with Red Hat Enterprise Linux 5, 6, and 7. This issue affects the versions of httpd24-httpd as shipped with Red Hat Software Collections. Product Security has rated this issue as having Moderate security impact.\n\nIn order to be vulnerable, .htaccess files need to contain an invalid or not globally registered HTTP method in a \"Limit\" directive.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-125.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-125.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-125.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.23-125.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.23-125.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.23-125.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.23-125.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-libs-0:2.4.23-125.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-libs-0:2.4.23-125.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.23-125.jbcs.el6.noarch", "6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.23-125.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.23-125.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.23-125.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.23-125.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_bmx-0:0.9.6-15.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_bmx-0:0.9.6-15.GA.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_bmx-0:0.9.6-15.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_bmx-debuginfo-0:0.9.6-15.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_bmx-debuginfo-0:0.9.6-15.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.8-1.Final_redhat_1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.8-1.Final_redhat_1.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.8-1.Final_redhat_1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.8-1.Final_redhat_1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.8-1.Final_redhat_1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.23-125.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.23-125.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.23-125.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.23-125.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.23-125.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.23-125.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.23-125.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.23-125.jbcs.el6.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2017-9798" }, { "category": "external", "summary": "RHBZ#1490344", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1490344" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2017-9798", "url": "https://www.cve.org/CVERecord?id=CVE-2017-9798" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-9798", "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-9798" }, { "category": "external", "summary": "https://blog.fuzzing-project.org/60-Optionsbleed-HTTP-OPTIONS-method-can-leak-Apaches-server-memory.html", "url": "https://blog.fuzzing-project.org/60-Optionsbleed-HTTP-OPTIONS-method-can-leak-Apaches-server-memory.html" } ], "release_date": "2017-09-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2017-12-15T22:34:40+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically.", "product_ids": [ "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-125.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-125.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-125.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.23-125.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.23-125.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.23-125.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.23-125.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-libs-0:2.4.23-125.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-libs-0:2.4.23-125.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.23-125.jbcs.el6.noarch", "6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.23-125.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.23-125.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.23-125.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.23-125.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_bmx-0:0.9.6-15.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_bmx-0:0.9.6-15.GA.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_bmx-0:0.9.6-15.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_bmx-debuginfo-0:0.9.6-15.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_bmx-debuginfo-0:0.9.6-15.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.8-1.Final_redhat_1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.8-1.Final_redhat_1.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.8-1.Final_redhat_1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.8-1.Final_redhat_1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.8-1.Final_redhat_1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.23-125.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.23-125.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.23-125.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.23-125.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.23-125.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.23-125.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.23-125.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.23-125.jbcs.el6.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2017:3477" }, { "category": "workaround", "details": "This issue can be mitigated by configuring httpd to disallow the use of the \"Limit\" configuration directive in .htaccess files. The set of directives that can be used in .htaccess files is configured using the \"AllowOverride\" directive. Refer to Red Hat Bugzilla bug 1490344 for further details:\nhttps://bugzilla.redhat.com/show_bug.cgi?id=1490344#c18", "product_ids": [ "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-125.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-125.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-125.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.23-125.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.23-125.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.23-125.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.23-125.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-libs-0:2.4.23-125.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-libs-0:2.4.23-125.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.23-125.jbcs.el6.noarch", "6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.23-125.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.23-125.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.23-125.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.23-125.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_bmx-0:0.9.6-15.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_bmx-0:0.9.6-15.GA.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_bmx-0:0.9.6-15.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_bmx-debuginfo-0:0.9.6-15.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_bmx-debuginfo-0:0.9.6-15.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.8-1.Final_redhat_1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.8-1.Final_redhat_1.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.8-1.Final_redhat_1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.8-1.Final_redhat_1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.8-1.Final_redhat_1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.23-125.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.23-125.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.23-125.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.23-125.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.23-125.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.23-125.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.23-125.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.23-125.jbcs.el6.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-125.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-125.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-125.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.23-125.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.23-125.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.23-125.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.23-125.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-libs-0:2.4.23-125.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-libs-0:2.4.23-125.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.23-125.jbcs.el6.noarch", "6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.23-125.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.23-125.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.23-125.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.23-125.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_bmx-0:0.9.6-15.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_bmx-0:0.9.6-15.GA.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_bmx-0:0.9.6-15.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_bmx-debuginfo-0:0.9.6-15.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_bmx-debuginfo-0:0.9.6-15.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.8-1.Final_redhat_1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.8-1.Final_redhat_1.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.8-1.Final_redhat_1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.8-1.Final_redhat_1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.8-1.Final_redhat_1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.23-125.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.23-125.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.23-125.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.23-125.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.23-125.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.23-125.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.23-125.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.23-125.jbcs.el6.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "httpd: Use-after-free by limiting unregistered HTTP method (Optionsbleed)" }, { "cve": "CVE-2017-12613", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "discovery_date": "2017-10-24T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1506523" } ], "notes": [ { "category": "description", "text": "An out-of-bounds array dereference was found in apr_time_exp_get(). An attacker could abuse an unvalidated usage of this function to cause a denial of service or potentially lead to data leak.", "title": "Vulnerability description" }, { "category": "summary", "text": "apr: Out-of-bounds array deref in apr_time_exp*() functions", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-125.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-125.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-125.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.23-125.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.23-125.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.23-125.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.23-125.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-libs-0:2.4.23-125.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-libs-0:2.4.23-125.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.23-125.jbcs.el6.noarch", "6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.23-125.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.23-125.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.23-125.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.23-125.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_bmx-0:0.9.6-15.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_bmx-0:0.9.6-15.GA.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_bmx-0:0.9.6-15.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_bmx-debuginfo-0:0.9.6-15.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_bmx-debuginfo-0:0.9.6-15.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.8-1.Final_redhat_1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.8-1.Final_redhat_1.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.8-1.Final_redhat_1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.8-1.Final_redhat_1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.8-1.Final_redhat_1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.23-125.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.23-125.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.23-125.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.23-125.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.23-125.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.23-125.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.23-125.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.23-125.jbcs.el6.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2017-12613" }, { "category": "external", "summary": "RHBZ#1506523", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1506523" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2017-12613", "url": "https://www.cve.org/CVERecord?id=CVE-2017-12613" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-12613", "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-12613" }, { "category": "external", "summary": "http://www.apache.org/dist/apr/Announcement1.x.html", "url": "http://www.apache.org/dist/apr/Announcement1.x.html" } ], "release_date": "2017-10-23T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2017-12-15T22:34:40+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically.", "product_ids": [ "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-125.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-125.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-125.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.23-125.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.23-125.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.23-125.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.23-125.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-libs-0:2.4.23-125.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-libs-0:2.4.23-125.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.23-125.jbcs.el6.noarch", "6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.23-125.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.23-125.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.23-125.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.23-125.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_bmx-0:0.9.6-15.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_bmx-0:0.9.6-15.GA.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_bmx-0:0.9.6-15.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_bmx-debuginfo-0:0.9.6-15.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_bmx-debuginfo-0:0.9.6-15.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.8-1.Final_redhat_1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.8-1.Final_redhat_1.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.8-1.Final_redhat_1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.8-1.Final_redhat_1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.8-1.Final_redhat_1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.23-125.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.23-125.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.23-125.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.23-125.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.23-125.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.23-125.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.23-125.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.23-125.jbcs.el6.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2017:3477" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.4, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H", "version": "3.0" }, "products": [ "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-125.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-125.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-125.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.23-125.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.23-125.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.23-125.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.23-125.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-libs-0:2.4.23-125.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-libs-0:2.4.23-125.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.23-125.jbcs.el6.noarch", "6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.23-125.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.23-125.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.23-125.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.23-125.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_bmx-0:0.9.6-15.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_bmx-0:0.9.6-15.GA.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_bmx-0:0.9.6-15.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_bmx-debuginfo-0:0.9.6-15.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_bmx-debuginfo-0:0.9.6-15.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.8-1.Final_redhat_1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.8-1.Final_redhat_1.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.8-1.Final_redhat_1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.8-1.Final_redhat_1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.8-1.Final_redhat_1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.23-125.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.23-125.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.23-125.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.23-125.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.23-125.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.23-125.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.23-125.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.23-125.jbcs.el6.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "apr: Out-of-bounds array deref in apr_time_exp*() functions" } ] }
rhsa-2017_3476
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update is now available for JBoss Core Services on RHEL 7.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Red Hat JBoss Core Services is a set of supplementary software for Red Hat JBoss middleware products. This software, such as Apache HTTP Server, is common to multiple JBoss middleware products, and is packaged under Red Hat JBoss Core Services to allow for faster distribution of updates, and for a more consistent update experience.\n\nThis release of Red Hat JBoss Core Services Apache HTTP Server 2.4.23 Service Pack 3 serves as an update to Red Hat JBoss Core Services Apache HTTP Server 2.4.23 Service Pack 2, and includes bug fixes, which are documented in the Release Notes document linked to in the References.\n\nSecurity Fix(es):\n\n* An out-of-bounds array dereference was found in apr_time_exp_get(). An attacker could abuse an unvalidated usage of this function to cause a denial of service or potentially lead to data leak. (CVE-2017-12613)\n\n* It was discovered that the use of httpd\u0027s ap_get_basic_auth_pw() API function outside of the authentication phase could lead to authentication bypass. A remote attacker could possibly use this flaw to bypass required authentication if the API was used incorrectly by one of the modules used by httpd. (CVE-2017-3167)\n\n* A NULL pointer dereference flaw was found in the httpd\u0027s mod_ssl module. A remote attacker could use this flaw to cause an httpd child process to crash if another module used by httpd called a certain API function during the processing of an HTTPS request. (CVE-2017-3169)\n\n* A buffer over-read flaw was found in the httpd\u0027s mod_mime module. A user permitted to modify httpd\u0027s MIME configuration could use this flaw to cause httpd child process to crash. (CVE-2017-7679)\n\n* A use-after-free flaw was found in the way httpd handled invalid and previously unregistered HTTP methods specified in the Limit directive used in an .htaccess file. A remote attacker could possibly use this flaw to disclose portions of the server memory, or cause httpd child process to crash. (CVE-2017-9798)\n\nRed Hat would like to thank Hanno B\u00f6ck for reporting CVE-2017-9798.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2017:3476", "url": "https://access.redhat.com/errata/RHSA-2017:3476" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "https://access.redhat.com/documentation/en/red-hat-jboss-core-services/", "url": "https://access.redhat.com/documentation/en/red-hat-jboss-core-services/" }, { "category": "external", "summary": "1463194", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1463194" }, { "category": "external", "summary": "1463197", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1463197" }, { "category": "external", "summary": "1463207", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1463207" }, { "category": "external", "summary": "1490344", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1490344" }, { "category": "external", "summary": "1506523", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1506523" }, { "category": "external", "summary": "JBCS-402", "url": "https://issues.redhat.com/browse/JBCS-402" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2017/rhsa-2017_3476.json" } ], "title": "Red Hat Security Advisory: Red Hat JBoss Core Services Apache HTTP Server 2.4.23 security update", "tracking": { "current_release_date": "2024-11-14T23:39:45+00:00", "generator": { "date": "2024-11-14T23:39:45+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2017:3476", "initial_release_date": "2017-12-15T22:34:21+00:00", "revision_history": [ { "date": "2017-12-15T22:34:21+00:00", "number": "1", "summary": "Initial version" }, { "date": "2017-12-15T22:34:21+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-14T23:39:45+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat JBoss Core Services on RHEL 7 Server", "product": { "name": "Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS", "product_identification_helper": { "cpe": "cpe:/a:redhat:jboss_core_services:1::el7" } } } ], "category": "product_family", "name": "Red Hat JBoss Core Services" }, { "branches": [ { "category": "product_version", "name": "jbcs-httpd24-mod_session-0:2.4.23-125.jbcs.el7.x86_64", "product": { "name": "jbcs-httpd24-mod_session-0:2.4.23-125.jbcs.el7.x86_64", "product_id": "jbcs-httpd24-mod_session-0:2.4.23-125.jbcs.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_session@2.4.23-125.jbcs.el7?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_ssl-1:2.4.23-125.jbcs.el7.x86_64", "product": { "name": "jbcs-httpd24-mod_ssl-1:2.4.23-125.jbcs.el7.x86_64", "product_id": "jbcs-httpd24-mod_ssl-1:2.4.23-125.jbcs.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_ssl@2.4.23-125.jbcs.el7?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "jbcs-httpd24-httpd-0:2.4.23-125.jbcs.el7.x86_64", "product": { "name": "jbcs-httpd24-httpd-0:2.4.23-125.jbcs.el7.x86_64", "product_id": "jbcs-httpd24-httpd-0:2.4.23-125.jbcs.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-httpd@2.4.23-125.jbcs.el7?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-httpd-selinux-0:2.4.23-125.jbcs.el7.x86_64", "product": { "name": "jbcs-httpd24-httpd-selinux-0:2.4.23-125.jbcs.el7.x86_64", "product_id": "jbcs-httpd24-httpd-selinux-0:2.4.23-125.jbcs.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-httpd-selinux@2.4.23-125.jbcs.el7?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_proxy_html-1:2.4.23-125.jbcs.el7.x86_64", "product": { "name": "jbcs-httpd24-mod_proxy_html-1:2.4.23-125.jbcs.el7.x86_64", "product_id": "jbcs-httpd24-mod_proxy_html-1:2.4.23-125.jbcs.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_proxy_html@2.4.23-125.jbcs.el7?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "jbcs-httpd24-httpd-libs-0:2.4.23-125.jbcs.el7.x86_64", "product": { "name": "jbcs-httpd24-httpd-libs-0:2.4.23-125.jbcs.el7.x86_64", "product_id": "jbcs-httpd24-httpd-libs-0:2.4.23-125.jbcs.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-httpd-libs@2.4.23-125.jbcs.el7?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_ldap-0:2.4.23-125.jbcs.el7.x86_64", "product": { "name": "jbcs-httpd24-mod_ldap-0:2.4.23-125.jbcs.el7.x86_64", "product_id": "jbcs-httpd24-mod_ldap-0:2.4.23-125.jbcs.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_ldap@2.4.23-125.jbcs.el7?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-httpd-debuginfo-0:2.4.23-125.jbcs.el7.x86_64", "product": { "name": "jbcs-httpd24-httpd-debuginfo-0:2.4.23-125.jbcs.el7.x86_64", "product_id": "jbcs-httpd24-httpd-debuginfo-0:2.4.23-125.jbcs.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-httpd-debuginfo@2.4.23-125.jbcs.el7?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-httpd-tools-0:2.4.23-125.jbcs.el7.x86_64", "product": { "name": "jbcs-httpd24-httpd-tools-0:2.4.23-125.jbcs.el7.x86_64", "product_id": "jbcs-httpd24-httpd-tools-0:2.4.23-125.jbcs.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-httpd-tools@2.4.23-125.jbcs.el7?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-httpd-devel-0:2.4.23-125.jbcs.el7.x86_64", "product": { "name": "jbcs-httpd24-httpd-devel-0:2.4.23-125.jbcs.el7.x86_64", "product_id": "jbcs-httpd24-httpd-devel-0:2.4.23-125.jbcs.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-httpd-devel@2.4.23-125.jbcs.el7?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_bmx-0:0.9.6-15.GA.jbcs.el7.x86_64", "product": { "name": "jbcs-httpd24-mod_bmx-0:0.9.6-15.GA.jbcs.el7.x86_64", "product_id": "jbcs-httpd24-mod_bmx-0:0.9.6-15.GA.jbcs.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_bmx@0.9.6-15.GA.jbcs.el7?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_bmx-debuginfo-0:0.9.6-15.GA.jbcs.el7.x86_64", "product": { "name": "jbcs-httpd24-mod_bmx-debuginfo-0:0.9.6-15.GA.jbcs.el7.x86_64", "product_id": "jbcs-httpd24-mod_bmx-debuginfo-0:0.9.6-15.GA.jbcs.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_bmx-debuginfo@0.9.6-15.GA.jbcs.el7?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_cluster-native-0:1.3.8-1.Final_redhat_1.jbcs.el7.x86_64", "product": { "name": "jbcs-httpd24-mod_cluster-native-0:1.3.8-1.Final_redhat_1.jbcs.el7.x86_64", "product_id": "jbcs-httpd24-mod_cluster-native-0:1.3.8-1.Final_redhat_1.jbcs.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_cluster-native@1.3.8-1.Final_redhat_1.jbcs.el7?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.8-1.Final_redhat_1.jbcs.el7.x86_64", "product": { "name": "jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.8-1.Final_redhat_1.jbcs.el7.x86_64", "product_id": "jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.8-1.Final_redhat_1.jbcs.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_cluster-native-debuginfo@1.3.8-1.Final_redhat_1.jbcs.el7?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "jbcs-httpd24-httpd-0:2.4.23-125.jbcs.el7.src", "product": { "name": "jbcs-httpd24-httpd-0:2.4.23-125.jbcs.el7.src", "product_id": "jbcs-httpd24-httpd-0:2.4.23-125.jbcs.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-httpd@2.4.23-125.jbcs.el7?arch=src" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_bmx-0:0.9.6-15.GA.jbcs.el7.src", "product": { "name": "jbcs-httpd24-mod_bmx-0:0.9.6-15.GA.jbcs.el7.src", "product_id": "jbcs-httpd24-mod_bmx-0:0.9.6-15.GA.jbcs.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_bmx@0.9.6-15.GA.jbcs.el7?arch=src" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_cluster-native-0:1.3.8-1.Final_redhat_1.jbcs.el7.src", "product": { "name": "jbcs-httpd24-mod_cluster-native-0:1.3.8-1.Final_redhat_1.jbcs.el7.src", "product_id": "jbcs-httpd24-mod_cluster-native-0:1.3.8-1.Final_redhat_1.jbcs.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_cluster-native@1.3.8-1.Final_redhat_1.jbcs.el7?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "jbcs-httpd24-httpd-manual-0:2.4.23-125.jbcs.el7.noarch", "product": { "name": "jbcs-httpd24-httpd-manual-0:2.4.23-125.jbcs.el7.noarch", "product_id": "jbcs-httpd24-httpd-manual-0:2.4.23-125.jbcs.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-httpd-manual@2.4.23-125.jbcs.el7?arch=noarch" } } } ], "category": "architecture", "name": "noarch" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-httpd-0:2.4.23-125.jbcs.el7.src as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-125.jbcs.el7.src" }, "product_reference": "jbcs-httpd24-httpd-0:2.4.23-125.jbcs.el7.src", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-httpd-0:2.4.23-125.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-125.jbcs.el7.x86_64" }, "product_reference": "jbcs-httpd24-httpd-0:2.4.23-125.jbcs.el7.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-httpd-debuginfo-0:2.4.23-125.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.23-125.jbcs.el7.x86_64" }, "product_reference": "jbcs-httpd24-httpd-debuginfo-0:2.4.23-125.jbcs.el7.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-httpd-devel-0:2.4.23-125.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.23-125.jbcs.el7.x86_64" }, "product_reference": "jbcs-httpd24-httpd-devel-0:2.4.23-125.jbcs.el7.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-httpd-libs-0:2.4.23-125.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-httpd-libs-0:2.4.23-125.jbcs.el7.x86_64" }, "product_reference": "jbcs-httpd24-httpd-libs-0:2.4.23-125.jbcs.el7.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-httpd-manual-0:2.4.23-125.jbcs.el7.noarch as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.23-125.jbcs.el7.noarch" }, "product_reference": "jbcs-httpd24-httpd-manual-0:2.4.23-125.jbcs.el7.noarch", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-httpd-selinux-0:2.4.23-125.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.23-125.jbcs.el7.x86_64" }, "product_reference": "jbcs-httpd24-httpd-selinux-0:2.4.23-125.jbcs.el7.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-httpd-tools-0:2.4.23-125.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.23-125.jbcs.el7.x86_64" }, "product_reference": "jbcs-httpd24-httpd-tools-0:2.4.23-125.jbcs.el7.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_bmx-0:0.9.6-15.GA.jbcs.el7.src as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-mod_bmx-0:0.9.6-15.GA.jbcs.el7.src" }, "product_reference": "jbcs-httpd24-mod_bmx-0:0.9.6-15.GA.jbcs.el7.src", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_bmx-0:0.9.6-15.GA.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-mod_bmx-0:0.9.6-15.GA.jbcs.el7.x86_64" }, "product_reference": "jbcs-httpd24-mod_bmx-0:0.9.6-15.GA.jbcs.el7.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_bmx-debuginfo-0:0.9.6-15.GA.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-mod_bmx-debuginfo-0:0.9.6-15.GA.jbcs.el7.x86_64" }, "product_reference": "jbcs-httpd24-mod_bmx-debuginfo-0:0.9.6-15.GA.jbcs.el7.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_cluster-native-0:1.3.8-1.Final_redhat_1.jbcs.el7.src as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.8-1.Final_redhat_1.jbcs.el7.src" }, "product_reference": "jbcs-httpd24-mod_cluster-native-0:1.3.8-1.Final_redhat_1.jbcs.el7.src", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_cluster-native-0:1.3.8-1.Final_redhat_1.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.8-1.Final_redhat_1.jbcs.el7.x86_64" }, "product_reference": "jbcs-httpd24-mod_cluster-native-0:1.3.8-1.Final_redhat_1.jbcs.el7.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.8-1.Final_redhat_1.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.8-1.Final_redhat_1.jbcs.el7.x86_64" }, "product_reference": "jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.8-1.Final_redhat_1.jbcs.el7.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_ldap-0:2.4.23-125.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.23-125.jbcs.el7.x86_64" }, "product_reference": "jbcs-httpd24-mod_ldap-0:2.4.23-125.jbcs.el7.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_proxy_html-1:2.4.23-125.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.23-125.jbcs.el7.x86_64" }, "product_reference": "jbcs-httpd24-mod_proxy_html-1:2.4.23-125.jbcs.el7.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_session-0:2.4.23-125.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.23-125.jbcs.el7.x86_64" }, "product_reference": "jbcs-httpd24-mod_session-0:2.4.23-125.jbcs.el7.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_ssl-1:2.4.23-125.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.23-125.jbcs.el7.x86_64" }, "product_reference": "jbcs-httpd24-mod_ssl-1:2.4.23-125.jbcs.el7.x86_64", "relates_to_product_reference": "7Server-JBCS" } ] }, "vulnerabilities": [ { "cve": "CVE-2017-3167", "cwe": { "id": "CWE-287", "name": "Improper Authentication" }, "discovery_date": "2017-06-20T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1463194" } ], "notes": [ { "category": "description", "text": "It was discovered that the use of httpd\u0027s ap_get_basic_auth_pw() API function outside of the authentication phase could lead to authentication bypass. A remote attacker could possibly use this flaw to bypass required authentication if the API was used incorrectly by one of the modules used by httpd.", "title": "Vulnerability description" }, { "category": "summary", "text": "httpd: ap_get_basic_auth_pw() authentication bypass", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-125.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-125.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.23-125.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.23-125.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-libs-0:2.4.23-125.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.23-125.jbcs.el7.noarch", "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.23-125.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.23-125.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_bmx-0:0.9.6-15.GA.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_bmx-0:0.9.6-15.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_bmx-debuginfo-0:0.9.6-15.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.8-1.Final_redhat_1.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.8-1.Final_redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.8-1.Final_redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.23-125.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.23-125.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.23-125.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.23-125.jbcs.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2017-3167" }, { "category": "external", "summary": "RHBZ#1463194", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1463194" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2017-3167", "url": "https://www.cve.org/CVERecord?id=CVE-2017-3167" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-3167", "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-3167" }, { "category": "external", "summary": "https://httpd.apache.org/security/vulnerabilities_22.html", "url": "https://httpd.apache.org/security/vulnerabilities_22.html" }, { "category": "external", "summary": "https://httpd.apache.org/security/vulnerabilities_24.html", "url": "https://httpd.apache.org/security/vulnerabilities_24.html" } ], "release_date": "2017-06-20T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2017-12-15T22:34:21+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically.", "product_ids": [ "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-125.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-125.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.23-125.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.23-125.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-libs-0:2.4.23-125.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.23-125.jbcs.el7.noarch", "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.23-125.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.23-125.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_bmx-0:0.9.6-15.GA.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_bmx-0:0.9.6-15.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_bmx-debuginfo-0:0.9.6-15.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.8-1.Final_redhat_1.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.8-1.Final_redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.8-1.Final_redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.23-125.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.23-125.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.23-125.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.23-125.jbcs.el7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2017:3476" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.4, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.0" }, "products": [ "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-125.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-125.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.23-125.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.23-125.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-libs-0:2.4.23-125.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.23-125.jbcs.el7.noarch", "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.23-125.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.23-125.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_bmx-0:0.9.6-15.GA.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_bmx-0:0.9.6-15.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_bmx-debuginfo-0:0.9.6-15.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.8-1.Final_redhat_1.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.8-1.Final_redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.8-1.Final_redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.23-125.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.23-125.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.23-125.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.23-125.jbcs.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "httpd: ap_get_basic_auth_pw() authentication bypass" }, { "cve": "CVE-2017-3169", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "discovery_date": "2017-06-20T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1463197" } ], "notes": [ { "category": "description", "text": "A NULL pointer dereference flaw was found in the httpd\u0027s mod_ssl module. A remote attacker could use this flaw to cause an httpd child process to crash if another module used by httpd called a certain API function during the processing of an HTTPS request.", "title": "Vulnerability description" }, { "category": "summary", "text": "httpd: mod_ssl NULL pointer dereference", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-125.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-125.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.23-125.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.23-125.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-libs-0:2.4.23-125.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.23-125.jbcs.el7.noarch", "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.23-125.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.23-125.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_bmx-0:0.9.6-15.GA.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_bmx-0:0.9.6-15.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_bmx-debuginfo-0:0.9.6-15.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.8-1.Final_redhat_1.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.8-1.Final_redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.8-1.Final_redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.23-125.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.23-125.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.23-125.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.23-125.jbcs.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2017-3169" }, { "category": "external", "summary": "RHBZ#1463197", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1463197" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2017-3169", "url": "https://www.cve.org/CVERecord?id=CVE-2017-3169" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-3169", "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-3169" }, { "category": "external", "summary": "https://httpd.apache.org/security/vulnerabilities_22.html", "url": "https://httpd.apache.org/security/vulnerabilities_22.html" }, { "category": "external", "summary": "https://httpd.apache.org/security/vulnerabilities_24.html", "url": "https://httpd.apache.org/security/vulnerabilities_24.html" } ], "release_date": "2017-06-20T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2017-12-15T22:34:21+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically.", "product_ids": [ "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-125.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-125.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.23-125.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.23-125.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-libs-0:2.4.23-125.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.23-125.jbcs.el7.noarch", "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.23-125.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.23-125.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_bmx-0:0.9.6-15.GA.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_bmx-0:0.9.6-15.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_bmx-debuginfo-0:0.9.6-15.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.8-1.Final_redhat_1.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.8-1.Final_redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.8-1.Final_redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.23-125.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.23-125.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.23-125.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.23-125.jbcs.el7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2017:3476" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 3.7, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-125.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-125.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.23-125.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.23-125.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-libs-0:2.4.23-125.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.23-125.jbcs.el7.noarch", "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.23-125.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.23-125.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_bmx-0:0.9.6-15.GA.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_bmx-0:0.9.6-15.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_bmx-debuginfo-0:0.9.6-15.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.8-1.Final_redhat_1.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.8-1.Final_redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.8-1.Final_redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.23-125.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.23-125.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.23-125.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.23-125.jbcs.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "httpd: mod_ssl NULL pointer dereference" }, { "cve": "CVE-2017-7679", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "discovery_date": "2017-06-20T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1463207" } ], "notes": [ { "category": "description", "text": "A buffer over-read flaw was found in the httpd\u0027s mod_mime module. A user permitted to modify httpd\u0027s MIME configuration could use this flaw to cause httpd child process to crash.", "title": "Vulnerability description" }, { "category": "summary", "text": "httpd: mod_mime buffer overread", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-125.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-125.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.23-125.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.23-125.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-libs-0:2.4.23-125.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.23-125.jbcs.el7.noarch", "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.23-125.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.23-125.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_bmx-0:0.9.6-15.GA.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_bmx-0:0.9.6-15.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_bmx-debuginfo-0:0.9.6-15.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.8-1.Final_redhat_1.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.8-1.Final_redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.8-1.Final_redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.23-125.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.23-125.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.23-125.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.23-125.jbcs.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2017-7679" }, { "category": "external", "summary": "RHBZ#1463207", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1463207" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2017-7679", "url": "https://www.cve.org/CVERecord?id=CVE-2017-7679" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-7679", "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-7679" }, { "category": "external", "summary": "https://httpd.apache.org/security/vulnerabilities_22.html", "url": "https://httpd.apache.org/security/vulnerabilities_22.html" }, { "category": "external", "summary": "https://httpd.apache.org/security/vulnerabilities_24.html", "url": "https://httpd.apache.org/security/vulnerabilities_24.html" } ], "release_date": "2017-06-20T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2017-12-15T22:34:21+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically.", "product_ids": [ "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-125.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-125.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.23-125.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.23-125.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-libs-0:2.4.23-125.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.23-125.jbcs.el7.noarch", "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.23-125.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.23-125.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_bmx-0:0.9.6-15.GA.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_bmx-0:0.9.6-15.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_bmx-debuginfo-0:0.9.6-15.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.8-1.Final_redhat_1.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.8-1.Final_redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.8-1.Final_redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.23-125.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.23-125.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.23-125.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.23-125.jbcs.el7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2017:3476" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 3.7, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-125.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-125.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.23-125.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.23-125.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-libs-0:2.4.23-125.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.23-125.jbcs.el7.noarch", "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.23-125.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.23-125.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_bmx-0:0.9.6-15.GA.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_bmx-0:0.9.6-15.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_bmx-debuginfo-0:0.9.6-15.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.8-1.Final_redhat_1.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.8-1.Final_redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.8-1.Final_redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.23-125.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.23-125.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.23-125.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.23-125.jbcs.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "httpd: mod_mime buffer overread" }, { "acknowledgments": [ { "names": [ "Hanno B\u00f6ck" ] } ], "cve": "CVE-2017-9798", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2017-09-11T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1490344" } ], "notes": [ { "category": "description", "text": "A use-after-free flaw was found in the way httpd handled invalid and previously unregistered HTTP methods specified in the Limit directive used in an .htaccess file. A remote attacker could possibly use this flaw to disclose portions of the server memory, or cause httpd child process to crash.", "title": "Vulnerability description" }, { "category": "summary", "text": "httpd: Use-after-free by limiting unregistered HTTP method (Optionsbleed)", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue affects the versions of httpd as shipped with Red Hat Enterprise Linux 5, 6, and 7. This issue affects the versions of httpd24-httpd as shipped with Red Hat Software Collections. Product Security has rated this issue as having Moderate security impact.\n\nIn order to be vulnerable, .htaccess files need to contain an invalid or not globally registered HTTP method in a \"Limit\" directive.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-125.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-125.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.23-125.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.23-125.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-libs-0:2.4.23-125.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.23-125.jbcs.el7.noarch", "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.23-125.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.23-125.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_bmx-0:0.9.6-15.GA.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_bmx-0:0.9.6-15.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_bmx-debuginfo-0:0.9.6-15.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.8-1.Final_redhat_1.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.8-1.Final_redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.8-1.Final_redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.23-125.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.23-125.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.23-125.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.23-125.jbcs.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2017-9798" }, { "category": "external", "summary": "RHBZ#1490344", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1490344" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2017-9798", "url": "https://www.cve.org/CVERecord?id=CVE-2017-9798" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-9798", "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-9798" }, { "category": "external", "summary": "https://blog.fuzzing-project.org/60-Optionsbleed-HTTP-OPTIONS-method-can-leak-Apaches-server-memory.html", "url": "https://blog.fuzzing-project.org/60-Optionsbleed-HTTP-OPTIONS-method-can-leak-Apaches-server-memory.html" } ], "release_date": "2017-09-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2017-12-15T22:34:21+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically.", "product_ids": [ "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-125.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-125.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.23-125.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.23-125.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-libs-0:2.4.23-125.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.23-125.jbcs.el7.noarch", "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.23-125.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.23-125.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_bmx-0:0.9.6-15.GA.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_bmx-0:0.9.6-15.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_bmx-debuginfo-0:0.9.6-15.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.8-1.Final_redhat_1.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.8-1.Final_redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.8-1.Final_redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.23-125.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.23-125.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.23-125.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.23-125.jbcs.el7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2017:3476" }, { "category": "workaround", "details": "This issue can be mitigated by configuring httpd to disallow the use of the \"Limit\" configuration directive in .htaccess files. The set of directives that can be used in .htaccess files is configured using the \"AllowOverride\" directive. Refer to Red Hat Bugzilla bug 1490344 for further details:\nhttps://bugzilla.redhat.com/show_bug.cgi?id=1490344#c18", "product_ids": [ "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-125.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-125.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.23-125.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.23-125.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-libs-0:2.4.23-125.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.23-125.jbcs.el7.noarch", "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.23-125.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.23-125.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_bmx-0:0.9.6-15.GA.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_bmx-0:0.9.6-15.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_bmx-debuginfo-0:0.9.6-15.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.8-1.Final_redhat_1.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.8-1.Final_redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.8-1.Final_redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.23-125.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.23-125.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.23-125.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.23-125.jbcs.el7.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-125.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-125.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.23-125.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.23-125.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-libs-0:2.4.23-125.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.23-125.jbcs.el7.noarch", "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.23-125.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.23-125.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_bmx-0:0.9.6-15.GA.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_bmx-0:0.9.6-15.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_bmx-debuginfo-0:0.9.6-15.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.8-1.Final_redhat_1.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.8-1.Final_redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.8-1.Final_redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.23-125.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.23-125.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.23-125.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.23-125.jbcs.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "httpd: Use-after-free by limiting unregistered HTTP method (Optionsbleed)" }, { "cve": "CVE-2017-12613", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "discovery_date": "2017-10-24T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1506523" } ], "notes": [ { "category": "description", "text": "An out-of-bounds array dereference was found in apr_time_exp_get(). An attacker could abuse an unvalidated usage of this function to cause a denial of service or potentially lead to data leak.", "title": "Vulnerability description" }, { "category": "summary", "text": "apr: Out-of-bounds array deref in apr_time_exp*() functions", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-125.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-125.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.23-125.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.23-125.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-libs-0:2.4.23-125.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.23-125.jbcs.el7.noarch", "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.23-125.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.23-125.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_bmx-0:0.9.6-15.GA.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_bmx-0:0.9.6-15.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_bmx-debuginfo-0:0.9.6-15.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.8-1.Final_redhat_1.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.8-1.Final_redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.8-1.Final_redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.23-125.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.23-125.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.23-125.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.23-125.jbcs.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2017-12613" }, { "category": "external", "summary": "RHBZ#1506523", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1506523" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2017-12613", "url": "https://www.cve.org/CVERecord?id=CVE-2017-12613" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-12613", "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-12613" }, { "category": "external", "summary": "http://www.apache.org/dist/apr/Announcement1.x.html", "url": "http://www.apache.org/dist/apr/Announcement1.x.html" } ], "release_date": "2017-10-23T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2017-12-15T22:34:21+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically.", "product_ids": [ "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-125.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-125.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.23-125.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.23-125.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-libs-0:2.4.23-125.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.23-125.jbcs.el7.noarch", "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.23-125.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.23-125.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_bmx-0:0.9.6-15.GA.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_bmx-0:0.9.6-15.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_bmx-debuginfo-0:0.9.6-15.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.8-1.Final_redhat_1.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.8-1.Final_redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.8-1.Final_redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.23-125.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.23-125.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.23-125.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.23-125.jbcs.el7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2017:3476" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.4, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H", "version": "3.0" }, "products": [ "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-125.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-125.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.23-125.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.23-125.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-libs-0:2.4.23-125.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.23-125.jbcs.el7.noarch", "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.23-125.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.23-125.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_bmx-0:0.9.6-15.GA.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_bmx-0:0.9.6-15.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_bmx-debuginfo-0:0.9.6-15.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.8-1.Final_redhat_1.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.8-1.Final_redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.8-1.Final_redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.23-125.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.23-125.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.23-125.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.23-125.jbcs.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "apr: Out-of-bounds array deref in apr_time_exp*() functions" } ] }
rhsa-2018_0465
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update is now available for Red Hat JBoss Web Server 3.1.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Red Hat JBoss Web Server is a fully integrated and certified set of components for hosting Java web applications. It is comprised of the Apache HTTP Server, the Apache Tomcat Servlet container, Apache Tomcat Connector (mod_jk), JBoss HTTP Connector (mod_cluster), Hibernate, and the Tomcat Native library.\n\nThis release of Red Hat JBoss Web Server 3.1 Service Pack 2 serves as a replacement for Red Hat JBoss Web Server 3.1, and includes bug fixes, which are documented in the Release Notes document linked to in the References.\n\nSecurity Fix(es):\n\n* apr: Out-of-bounds array deref in apr_time_exp*() functions (CVE-2017-12613)\n\n* tomcat: Remote Code Execution via JSP Upload (CVE-2017-12615)\n\n* tomcat: Information Disclosure when using VirtualDirContext (CVE-2017-12616)\n\n* tomcat: Remote Code Execution bypass for CVE-2017-12615 (CVE-2017-12617)\n\n* tomcat-native: Mishandling of client certificates can allow for OCSP check bypass (CVE-2017-15698)\n\n* tomcat: Incorrect handling of empty string URL in security constraints can lead to unintended exposure of resources (CVE-2018-1304)\n\n* tomcat: Late application of security constraints can lead to resource exposure for unauthorised users (CVE-2018-1305)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2018:0465", "url": "https://access.redhat.com/errata/RHSA-2018:0465" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?product=webserver\u0026downloadType=securityPatches\u0026version=3.1", "url": "https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?product=webserver\u0026downloadType=securityPatches\u0026version=3.1" }, { "category": "external", "summary": "https://access.redhat.com/documentation/en-us/red_hat_jboss_web_server/", "url": "https://access.redhat.com/documentation/en-us/red_hat_jboss_web_server/" }, { "category": "external", "summary": "https://access.redhat.com/security/vulnerabilities/httpoxy", "url": "https://access.redhat.com/security/vulnerabilities/httpoxy" }, { "category": "external", "summary": "https://access.redhat.com/solutions/2435491", "url": "https://access.redhat.com/solutions/2435491" }, { "category": "external", "summary": "1493220", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1493220" }, { "category": "external", "summary": "1493222", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1493222" }, { "category": "external", "summary": "1494283", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1494283" }, { "category": "external", "summary": "1506523", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1506523" }, { "category": "external", "summary": "1540824", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1540824" }, { "category": "external", "summary": "1548282", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1548282" }, { "category": "external", "summary": "1548289", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1548289" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2018/rhsa-2018_0465.json" } ], "title": "Red Hat Security Advisory: Red Hat JBoss Web Server 3.1.0 Service Pack 2 security update", "tracking": { "current_release_date": "2024-11-22T11:22:12+00:00", "generator": { "date": "2024-11-22T11:22:12+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2018:0465", "initial_release_date": "2018-03-07T15:09:54+00:00", "revision_history": [ { "date": "2018-03-07T15:09:54+00:00", "number": "1", "summary": "Initial version" }, { "date": "2018-03-07T15:09:54+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-22T11:22:12+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat JBoss Web Server 3.1", "product": { "name": "Red Hat JBoss Web Server 3.1", "product_id": "Red Hat JBoss Web Server 3.1", "product_identification_helper": { "cpe": "cpe:/a:redhat:jboss_enterprise_web_server:3.1" } } } ], "category": "product_family", "name": "Red Hat JBoss Web Server" } ], "category": "vendor", "name": "Red Hat" } ] }, "vulnerabilities": [ { "cve": "CVE-2017-12613", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "discovery_date": "2017-10-24T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1506523" } ], "notes": [ { "category": "description", "text": "An out-of-bounds array dereference was found in apr_time_exp_get(). An attacker could abuse an unvalidated usage of this function to cause a denial of service or potentially lead to data leak.", "title": "Vulnerability description" }, { "category": "summary", "text": "apr: Out-of-bounds array deref in apr_time_exp*() functions", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Web Server 3.1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2017-12613" }, { "category": "external", "summary": "RHBZ#1506523", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1506523" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2017-12613", "url": "https://www.cve.org/CVERecord?id=CVE-2017-12613" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-12613", "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-12613" }, { "category": "external", "summary": "http://www.apache.org/dist/apr/Announcement1.x.html", "url": "http://www.apache.org/dist/apr/Announcement1.x.html" } ], "release_date": "2017-10-23T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-03-07T15:09:54+00:00", "details": "Before applying the update, back up your existing Red Hat JBoss Web Server installation (including all applications and configuration files).\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat JBoss Web Server 3.1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2018:0465" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.4, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H", "version": "3.0" }, "products": [ "Red Hat JBoss Web Server 3.1" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "apr: Out-of-bounds array deref in apr_time_exp*() functions" }, { "cve": "CVE-2017-12615", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2017-09-19T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1493220" } ], "notes": [ { "category": "description", "text": "A vulnerability was discovered in Tomcat where if a servlet context was configured with readonly=false and HTTP PUT requests were allowed, an attacker could upload a JSP file to that context and achieve code execution.", "title": "Vulnerability description" }, { "category": "summary", "text": "tomcat: Remote Code Execution via JSP Upload", "title": "Vulnerability summary" }, { "category": "other", "text": "This flaw affects Tomcat on Red Hat Enterprise Linux only when a specific context is configured with readonly=false. The default configuration has a readonly context, so it is not affected.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Web Server 3.1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2017-12615" }, { "category": "external", "summary": "RHBZ#1493220", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1493220" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2017-12615", "url": "https://www.cve.org/CVERecord?id=CVE-2017-12615" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-12615", "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-12615" }, { "category": "external", "summary": "https://tomcat.apache.org/security-7.html#Fixed_in_Apache_Tomcat_7.0.81", "url": "https://tomcat.apache.org/security-7.html#Fixed_in_Apache_Tomcat_7.0.81" }, { "category": "external", "summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog", "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog" } ], "release_date": "2017-09-19T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-03-07T15:09:54+00:00", "details": "Before applying the update, back up your existing Red Hat JBoss Web Server installation (including all applications and configuration files).\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat JBoss Web Server 3.1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2018:0465" }, { "category": "workaround", "details": "Ensure that readonly is set to true (the default) for the DefaultServlet, WebDAV servlet or application context.\n\nBlock HTTP methods that permit resource modification for untrusted users.", "product_ids": [ "Red Hat JBoss Web Server 3.1" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "Red Hat JBoss Web Server 3.1" ] } ], "threats": [ { "category": "exploit_status", "date": "2022-03-25T00:00:00+00:00", "details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog" }, { "category": "impact", "details": "Important" } ], "title": "tomcat: Remote Code Execution via JSP Upload" }, { "cve": "CVE-2017-12616", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2017-09-19T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1493222" } ], "notes": [ { "category": "description", "text": "When using a VirtualDirContext with Apache Tomcat 7.0.0 to 7.0.80 it was possible to bypass security constraints and/or view the source code of JSPs for resources served by the VirtualDirContext using a specially crafted request.", "title": "Vulnerability description" }, { "category": "summary", "text": "tomcat: Information Disclosure when using VirtualDirContext", "title": "Vulnerability summary" }, { "category": "other", "text": "VirtualDirContext is not designed to be used in production, but only to ease development with IDEs without needing to fully republish jars in WEB-INF/lib.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Web Server 3.1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2017-12616" }, { "category": "external", "summary": "RHBZ#1493222", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1493222" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2017-12616", "url": "https://www.cve.org/CVERecord?id=CVE-2017-12616" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-12616", "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-12616" }, { "category": "external", "summary": "https://tomcat.apache.org/security-7.html#Fixed_in_Apache_Tomcat_7.0.81", "url": "https://tomcat.apache.org/security-7.html#Fixed_in_Apache_Tomcat_7.0.81" } ], "release_date": "2017-09-19T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-03-07T15:09:54+00:00", "details": "Before applying the update, back up your existing Red Hat JBoss Web Server installation (including all applications and configuration files).\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat JBoss Web Server 3.1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2018:0465" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.0" }, "products": [ "Red Hat JBoss Web Server 3.1" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "tomcat: Information Disclosure when using VirtualDirContext" }, { "cve": "CVE-2017-12617", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2017-09-21T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1494283" } ], "notes": [ { "category": "description", "text": "A vulnerability was discovered in Tomcat where if a servlet context was configured with readonly=false and HTTP PUT requests were allowed, an attacker could upload a JSP file to that context and achieve code execution.", "title": "Vulnerability description" }, { "category": "summary", "text": "tomcat: Remote Code Execution bypass for CVE-2017-12615", "title": "Vulnerability summary" }, { "category": "other", "text": "This flaw affects Tomcat on Red Hat Enterprise Linux only when a specific context is configured with readonly=false. The default configuration has a readonly context, so it is not affected.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Web Server 3.1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2017-12617" }, { "category": "external", "summary": "RHBZ#1494283", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1494283" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2017-12617", "url": "https://www.cve.org/CVERecord?id=CVE-2017-12617" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-12617", "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-12617" }, { "category": "external", "summary": "https://tomcat.apache.org/security-7.html", "url": "https://tomcat.apache.org/security-7.html" }, { "category": "external", "summary": "https://tomcat.apache.org/security-8.html", "url": "https://tomcat.apache.org/security-8.html" }, { "category": "external", "summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog", "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog" } ], "release_date": "2017-09-21T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-03-07T15:09:54+00:00", "details": "Before applying the update, back up your existing Red Hat JBoss Web Server installation (including all applications and configuration files).\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat JBoss Web Server 3.1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2018:0465" }, { "category": "workaround", "details": "Ensure that readonly is set to true (the default) for the DefaultServlet, WebDAV servlet or application context.\n\nBlock HTTP methods that permit resource modification for untrusted users.", "product_ids": [ "Red Hat JBoss Web Server 3.1" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "Red Hat JBoss Web Server 3.1" ] } ], "threats": [ { "category": "exploit_status", "date": "2022-03-25T00:00:00+00:00", "details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog" }, { "category": "impact", "details": "Important" } ], "title": "tomcat: Remote Code Execution bypass for CVE-2017-12615" }, { "cve": "CVE-2017-15698", "cwe": { "id": "CWE-299", "name": "Improper Check for Certificate Revocation" }, "discovery_date": "2018-02-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1540824" } ], "notes": [ { "category": "description", "text": "When parsing the AIA-Extension field of a client certificate, Apache Tomcat Native Connector 1.2.0 to 1.2.14 and 1.1.23 to 1.1.34 did not correctly handle fields longer than 127 bytes. The result of the parsing error was to skip the OCSP check. It was therefore possible for client certificates that should have been rejected (if the OCSP check had been made) to be accepted. Users not using OCSP checks are not affected by this vulnerability.", "title": "Vulnerability description" }, { "category": "summary", "text": "tomcat-native: Mishandling of client certificates can allow for OCSP check bypass", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Web Server 3.1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2017-15698" }, { "category": "external", "summary": "RHBZ#1540824", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1540824" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2017-15698", "url": "https://www.cve.org/CVERecord?id=CVE-2017-15698" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-15698", "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-15698" } ], "release_date": "2018-01-31T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-03-07T15:09:54+00:00", "details": "Before applying the update, back up your existing Red Hat JBoss Web Server installation (including all applications and configuration files).\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat JBoss Web Server 3.1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2018:0465" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N", "version": "3.0" }, "products": [ "Red Hat JBoss Web Server 3.1" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "tomcat-native: Mishandling of client certificates can allow for OCSP check bypass" }, { "cve": "CVE-2018-1304", "cwe": { "id": "CWE-284", "name": "Improper Access Control" }, "discovery_date": "2018-02-23T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1548289" } ], "notes": [ { "category": "description", "text": "The URL pattern of \"\" (the empty string) which exactly maps to the context root was not correctly handled in Apache Tomcat 9.0.0.M1 to 9.0.4, 8.5.0 to 8.5.27, 8.0.0.RC1 to 8.0.49 and 7.0.0 to 7.0.84 when used as part of a security constraint definition. This caused the constraint to be ignored. It was, therefore, possible for unauthorised users to gain access to web application resources that should have been protected. Only security constraints with a URL pattern of the empty string were affected.", "title": "Vulnerability description" }, { "category": "summary", "text": "tomcat: Incorrect handling of empty string URL in security constraints can lead to unintended exposure of resources", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Web Server 3.1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-1304" }, { "category": "external", "summary": "RHBZ#1548289", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1548289" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-1304", "url": "https://www.cve.org/CVERecord?id=CVE-2018-1304" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-1304", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-1304" }, { "category": "external", "summary": "https://tomcat.apache.org/security-7.html#Fixed_in_Apache_Tomcat_7.0.85", "url": "https://tomcat.apache.org/security-7.html#Fixed_in_Apache_Tomcat_7.0.85" }, { "category": "external", "summary": "https://tomcat.apache.org/security-8.html#Fixed_in_Apache_Tomcat_8.0.50", "url": "https://tomcat.apache.org/security-8.html#Fixed_in_Apache_Tomcat_8.0.50" }, { "category": "external", "summary": "https://tomcat.apache.org/security-8.html#Fixed_in_Apache_Tomcat_8.5.28", "url": "https://tomcat.apache.org/security-8.html#Fixed_in_Apache_Tomcat_8.5.28" } ], "release_date": "2018-01-31T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-03-07T15:09:54+00:00", "details": "Before applying the update, back up your existing Red Hat JBoss Web Server installation (including all applications and configuration files).\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat JBoss Web Server 3.1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2018:0465" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N", "version": "3.0" }, "products": [ "Red Hat JBoss Web Server 3.1" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "tomcat: Incorrect handling of empty string URL in security constraints can lead to unintended exposure of resources" }, { "cve": "CVE-2018-1305", "cwe": { "id": "CWE-284", "name": "Improper Access Control" }, "discovery_date": "2018-02-23T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1548282" } ], "notes": [ { "category": "description", "text": "Security constraints defined by annotations of Servlets in Apache Tomcat 9.0.0.M1 to 9.0.4, 8.5.0 to 8.5.27, 8.0.0.RC1 to 8.0.49 and 7.0.0 to 7.0.84 were only applied once a Servlet had been loaded. Because security constraints defined in this way apply to the URL pattern and any URLs below that point, it was possible - depending on the order Servlets were loaded - for some security constraints not to be applied. This could have exposed resources to users who were not authorised to access them.", "title": "Vulnerability description" }, { "category": "summary", "text": "tomcat: Late application of security constraints can lead to resource exposure for unauthorised users", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Web Server 3.1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-1305" }, { "category": "external", "summary": "RHBZ#1548282", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1548282" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-1305", "url": "https://www.cve.org/CVERecord?id=CVE-2018-1305" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-1305", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-1305" }, { "category": "external", "summary": "https://tomcat.apache.org/security-7.html#Fixed_in_Apache_Tomcat_7.0.85", "url": "https://tomcat.apache.org/security-7.html#Fixed_in_Apache_Tomcat_7.0.85" }, { "category": "external", "summary": "https://tomcat.apache.org/security-8.html#Fixed_in_Apache_Tomcat_8.0.50", "url": "https://tomcat.apache.org/security-8.html#Fixed_in_Apache_Tomcat_8.0.50" }, { "category": "external", "summary": "https://tomcat.apache.org/security-8.html#Fixed_in_Apache_Tomcat_8.5.28", "url": "https://tomcat.apache.org/security-8.html#Fixed_in_Apache_Tomcat_8.5.28" } ], "release_date": "2018-02-23T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-03-07T15:09:54+00:00", "details": "Before applying the update, back up your existing Red Hat JBoss Web Server installation (including all applications and configuration files).\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat JBoss Web Server 3.1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2018:0465" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N", "version": "3.0" }, "products": [ "Red Hat JBoss Web Server 3.1" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "tomcat: Late application of security constraints can lead to resource exposure for unauthorised users" } ] }
rhsa-2017_3475
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update is now available for Red Hat JBoss Core Services.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Red Hat JBoss Core Services is a set of supplementary software for Red Hat JBoss middleware products. This software, such as Apache HTTP Server, is common to multiple JBoss middleware products, and is packaged under Red Hat JBoss Core Services to allow for faster distribution of updates, and for a more consistent update experience.\n\nThis release of Red Hat JBoss Core Services Apache HTTP Server 2.4.23 Service Pack 3 serves as a replacement of Red Hat JBoss Core Services Apache HTTP Server 2.4.23, and includes bug fixes (including fixes from previous Service Pack 1 and 2), which are documented in the Release Notes document linked to in the References. \n\nSecurity Fix(es):\n\n* An out-of-bounds array dereference was found in apr_time_exp_get(). An attacker could abuse an unvalidated usage of this function to cause a denial of service or potentially lead to data leak. (CVE-2017-12613)\n\n* It was discovered that the use of httpd\u0027s ap_get_basic_auth_pw() API function outside of the authentication phase could lead to authentication bypass. A remote attacker could possibly use this flaw to bypass required authentication if the API was used incorrectly by one of the modules used by httpd. (CVE-2017-3167)\n\n* A NULL pointer dereference flaw was found in the httpd\u0027s mod_ssl module. A remote attacker could use this flaw to cause an httpd child process to crash if another module used by httpd called a certain API function during the processing of an HTTPS request. (CVE-2017-3169)\n\n* A buffer over-read flaw was found in the httpd\u0027s mod_mime module. A user permitted to modify httpd\u0027s MIME configuration could use this flaw to cause httpd child process to crash. (CVE-2017-7679)\n\n* A use-after-free flaw was found in the way httpd handled invalid and previously unregistered HTTP methods specified in the Limit directive used in an .htaccess file. A remote attacker could possibly use this flaw to disclose portions of the server memory, or cause httpd child process to crash. (CVE-2017-9798)\n\nRed Hat would like to thank Hanno B\u00f6ck for reporting CVE-2017-9798.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2017:3475", "url": "https://access.redhat.com/errata/RHSA-2017:3475" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?product=core.service.apachehttp\u0026downloadType=securityPatches\u0026version=2.4.23", "url": "https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?product=core.service.apachehttp\u0026downloadType=securityPatches\u0026version=2.4.23" }, { "category": "external", "summary": "https://access.redhat.com/documentation/en/red-hat-jboss-core-services/", "url": "https://access.redhat.com/documentation/en/red-hat-jboss-core-services/" }, { "category": "external", "summary": "1463194", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1463194" }, { "category": "external", "summary": "1463197", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1463197" }, { "category": "external", "summary": "1463207", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1463207" }, { "category": "external", "summary": "1490344", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1490344" }, { "category": "external", "summary": "1506523", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1506523" }, { "category": "external", "summary": "JBCS-404", "url": "https://issues.redhat.com/browse/JBCS-404" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2017/rhsa-2017_3475.json" } ], "title": "Red Hat Security Advisory: Red Hat JBoss Core Services Apache HTTP Server 2.4.23 security update", "tracking": { "current_release_date": "2024-11-14T23:39:55+00:00", "generator": { "date": "2024-11-14T23:39:55+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2017:3475", "initial_release_date": "2017-12-15T22:23:06+00:00", "revision_history": [ { "date": "2017-12-15T22:23:06+00:00", "number": "1", "summary": "Initial version" }, { "date": "2017-12-15T22:23:06+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-14T23:39:55+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat JBoss Core Services 1", "product": { "name": "Red Hat JBoss Core Services 1", "product_id": "Red Hat JBoss Core Services 1", "product_identification_helper": { "cpe": "cpe:/a:redhat:jboss_core_services:1" } } } ], "category": "product_family", "name": "Red Hat JBoss Core Services" } ], "category": "vendor", "name": "Red Hat" } ] }, "vulnerabilities": [ { "cve": "CVE-2017-3167", "cwe": { "id": "CWE-287", "name": "Improper Authentication" }, "discovery_date": "2017-06-20T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1463194" } ], "notes": [ { "category": "description", "text": "It was discovered that the use of httpd\u0027s ap_get_basic_auth_pw() API function outside of the authentication phase could lead to authentication bypass. A remote attacker could possibly use this flaw to bypass required authentication if the API was used incorrectly by one of the modules used by httpd.", "title": "Vulnerability description" }, { "category": "summary", "text": "httpd: ap_get_basic_auth_pw() authentication bypass", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Core Services 1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2017-3167" }, { "category": "external", "summary": "RHBZ#1463194", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1463194" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2017-3167", "url": "https://www.cve.org/CVERecord?id=CVE-2017-3167" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-3167", "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-3167" }, { "category": "external", "summary": "https://httpd.apache.org/security/vulnerabilities_22.html", "url": "https://httpd.apache.org/security/vulnerabilities_22.html" }, { "category": "external", "summary": "https://httpd.apache.org/security/vulnerabilities_24.html", "url": "https://httpd.apache.org/security/vulnerabilities_24.html" } ], "release_date": "2017-06-20T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2017-12-15T22:23:06+00:00", "details": "The References section of this erratum contains a download link (you must log in to download the update). Before applying the update, back up your existing Red Hat JBoss Web Server installation (including all applications and configuration files).\n\nAfter installing the updated packages, the httpd daemon will be restarted\nautomatically.", "product_ids": [ "Red Hat JBoss Core Services 1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2017:3475" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.4, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.0" }, "products": [ "Red Hat JBoss Core Services 1" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "httpd: ap_get_basic_auth_pw() authentication bypass" }, { "cve": "CVE-2017-3169", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "discovery_date": "2017-06-20T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1463197" } ], "notes": [ { "category": "description", "text": "A NULL pointer dereference flaw was found in the httpd\u0027s mod_ssl module. A remote attacker could use this flaw to cause an httpd child process to crash if another module used by httpd called a certain API function during the processing of an HTTPS request.", "title": "Vulnerability description" }, { "category": "summary", "text": "httpd: mod_ssl NULL pointer dereference", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Core Services 1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2017-3169" }, { "category": "external", "summary": "RHBZ#1463197", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1463197" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2017-3169", "url": "https://www.cve.org/CVERecord?id=CVE-2017-3169" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-3169", "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-3169" }, { "category": "external", "summary": "https://httpd.apache.org/security/vulnerabilities_22.html", "url": "https://httpd.apache.org/security/vulnerabilities_22.html" }, { "category": "external", "summary": "https://httpd.apache.org/security/vulnerabilities_24.html", "url": "https://httpd.apache.org/security/vulnerabilities_24.html" } ], "release_date": "2017-06-20T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2017-12-15T22:23:06+00:00", "details": "The References section of this erratum contains a download link (you must log in to download the update). Before applying the update, back up your existing Red Hat JBoss Web Server installation (including all applications and configuration files).\n\nAfter installing the updated packages, the httpd daemon will be restarted\nautomatically.", "product_ids": [ "Red Hat JBoss Core Services 1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2017:3475" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 3.7, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "Red Hat JBoss Core Services 1" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "httpd: mod_ssl NULL pointer dereference" }, { "cve": "CVE-2017-7679", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "discovery_date": "2017-06-20T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1463207" } ], "notes": [ { "category": "description", "text": "A buffer over-read flaw was found in the httpd\u0027s mod_mime module. A user permitted to modify httpd\u0027s MIME configuration could use this flaw to cause httpd child process to crash.", "title": "Vulnerability description" }, { "category": "summary", "text": "httpd: mod_mime buffer overread", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Core Services 1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2017-7679" }, { "category": "external", "summary": "RHBZ#1463207", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1463207" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2017-7679", "url": "https://www.cve.org/CVERecord?id=CVE-2017-7679" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-7679", "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-7679" }, { "category": "external", "summary": "https://httpd.apache.org/security/vulnerabilities_22.html", "url": "https://httpd.apache.org/security/vulnerabilities_22.html" }, { "category": "external", "summary": "https://httpd.apache.org/security/vulnerabilities_24.html", "url": "https://httpd.apache.org/security/vulnerabilities_24.html" } ], "release_date": "2017-06-20T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2017-12-15T22:23:06+00:00", "details": "The References section of this erratum contains a download link (you must log in to download the update). Before applying the update, back up your existing Red Hat JBoss Web Server installation (including all applications and configuration files).\n\nAfter installing the updated packages, the httpd daemon will be restarted\nautomatically.", "product_ids": [ "Red Hat JBoss Core Services 1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2017:3475" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 3.7, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "Red Hat JBoss Core Services 1" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "httpd: mod_mime buffer overread" }, { "acknowledgments": [ { "names": [ "Hanno B\u00f6ck" ] } ], "cve": "CVE-2017-9798", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2017-09-11T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1490344" } ], "notes": [ { "category": "description", "text": "A use-after-free flaw was found in the way httpd handled invalid and previously unregistered HTTP methods specified in the Limit directive used in an .htaccess file. A remote attacker could possibly use this flaw to disclose portions of the server memory, or cause httpd child process to crash.", "title": "Vulnerability description" }, { "category": "summary", "text": "httpd: Use-after-free by limiting unregistered HTTP method (Optionsbleed)", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue affects the versions of httpd as shipped with Red Hat Enterprise Linux 5, 6, and 7. This issue affects the versions of httpd24-httpd as shipped with Red Hat Software Collections. Product Security has rated this issue as having Moderate security impact.\n\nIn order to be vulnerable, .htaccess files need to contain an invalid or not globally registered HTTP method in a \"Limit\" directive.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Core Services 1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2017-9798" }, { "category": "external", "summary": "RHBZ#1490344", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1490344" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2017-9798", "url": "https://www.cve.org/CVERecord?id=CVE-2017-9798" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-9798", "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-9798" }, { "category": "external", "summary": "https://blog.fuzzing-project.org/60-Optionsbleed-HTTP-OPTIONS-method-can-leak-Apaches-server-memory.html", "url": "https://blog.fuzzing-project.org/60-Optionsbleed-HTTP-OPTIONS-method-can-leak-Apaches-server-memory.html" } ], "release_date": "2017-09-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2017-12-15T22:23:06+00:00", "details": "The References section of this erratum contains a download link (you must log in to download the update). Before applying the update, back up your existing Red Hat JBoss Web Server installation (including all applications and configuration files).\n\nAfter installing the updated packages, the httpd daemon will be restarted\nautomatically.", "product_ids": [ "Red Hat JBoss Core Services 1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2017:3475" }, { "category": "workaround", "details": "This issue can be mitigated by configuring httpd to disallow the use of the \"Limit\" configuration directive in .htaccess files. The set of directives that can be used in .htaccess files is configured using the \"AllowOverride\" directive. Refer to Red Hat Bugzilla bug 1490344 for further details:\nhttps://bugzilla.redhat.com/show_bug.cgi?id=1490344#c18", "product_ids": [ "Red Hat JBoss Core Services 1" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "Red Hat JBoss Core Services 1" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "httpd: Use-after-free by limiting unregistered HTTP method (Optionsbleed)" }, { "cve": "CVE-2017-12613", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "discovery_date": "2017-10-24T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1506523" } ], "notes": [ { "category": "description", "text": "An out-of-bounds array dereference was found in apr_time_exp_get(). An attacker could abuse an unvalidated usage of this function to cause a denial of service or potentially lead to data leak.", "title": "Vulnerability description" }, { "category": "summary", "text": "apr: Out-of-bounds array deref in apr_time_exp*() functions", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Core Services 1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2017-12613" }, { "category": "external", "summary": "RHBZ#1506523", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1506523" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2017-12613", "url": "https://www.cve.org/CVERecord?id=CVE-2017-12613" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-12613", "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-12613" }, { "category": "external", "summary": "http://www.apache.org/dist/apr/Announcement1.x.html", "url": "http://www.apache.org/dist/apr/Announcement1.x.html" } ], "release_date": "2017-10-23T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2017-12-15T22:23:06+00:00", "details": "The References section of this erratum contains a download link (you must log in to download the update). Before applying the update, back up your existing Red Hat JBoss Web Server installation (including all applications and configuration files).\n\nAfter installing the updated packages, the httpd daemon will be restarted\nautomatically.", "product_ids": [ "Red Hat JBoss Core Services 1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2017:3475" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.4, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H", "version": "3.0" }, "products": [ "Red Hat JBoss Core Services 1" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "apr: Out-of-bounds array deref in apr_time_exp*() functions" } ] }
rhsa-2018_0466
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update is now available for Red Hat JBoss Web Server 3.1 for RHEL 6 and Red Hat JBoss Web Server 3.1 for RHEL 7.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Red Hat JBoss Web Server is a fully integrated and certified set of components for hosting Java web applications. It is comprised of the Apache HTTP Server, the Apache Tomcat Servlet container, Apache Tomcat Connector (mod_jk), JBoss HTTP Connector (mod_cluster), Hibernate, and the Tomcat Native library.\n\nThis release of Red Hat JBoss Web Server 3.1 Service Pack 2 serves as a replacement for Red Hat JBoss Web Server 3.1, and includes bug fixes, which are documented in the Release Notes document linked to in the References.\n\nSecurity Fix(es):\n\n* apr: Out-of-bounds array deref in apr_time_exp*() functions (CVE-2017-12613)\n\n* tomcat: Remote Code Execution via JSP Upload (CVE-2017-12615)\n\n* tomcat: Information Disclosure when using VirtualDirContext (CVE-2017-12616)\n\n* tomcat: Remote Code Execution bypass for CVE-2017-12615 (CVE-2017-12617)\n\n* tomcat-native: Mishandling of client certificates can allow for OCSP check bypass (CVE-2017-15698)\n\n* tomcat: Incorrect handling of empty string URL in security constraints can lead to unintended exposure of resources (CVE-2018-1304)\n\n* tomcat: Late application of security constraints can lead to resource exposure for unauthorised users (CVE-2018-1305)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2018:0466", "url": "https://access.redhat.com/errata/RHSA-2018:0466" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "https://access.redhat.com/documentation/en-us/red_hat_jboss_web_server/", "url": "https://access.redhat.com/documentation/en-us/red_hat_jboss_web_server/" }, { "category": "external", "summary": "1493220", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1493220" }, { "category": "external", "summary": "1493222", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1493222" }, { "category": "external", "summary": "1494283", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1494283" }, { "category": "external", "summary": "1506523", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1506523" }, { "category": "external", "summary": "1540824", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1540824" }, { "category": "external", "summary": "1548282", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1548282" }, { "category": "external", "summary": "1548289", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1548289" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2018/rhsa-2018_0466.json" } ], "title": "Red Hat Security Advisory: Red Hat JBoss Web Server 3.1.0 Service Pack 2 security update", "tracking": { "current_release_date": "2024-11-22T11:22:07+00:00", "generator": { "date": "2024-11-22T11:22:07+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2018:0466", "initial_release_date": "2018-03-07T15:21:52+00:00", "revision_history": [ { "date": "2018-03-07T15:21:52+00:00", "number": "1", "summary": "Initial version" }, { "date": "2018-03-07T15:21:52+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-22T11:22:07+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat JBoss Web Server 3.1 for RHEL 6", "product": { "name": "Red Hat JBoss Web Server 3.1 for RHEL 6", "product_id": "6Server-JWS-3.1", "product_identification_helper": { "cpe": "cpe:/a:redhat:jboss_enterprise_web_server:3.1::el6" } } }, { "category": "product_name", "name": "Red Hat JBoss Web Server 3.1 for RHEL 7", "product": { "name": "Red Hat JBoss Web Server 3.1 for RHEL 7", "product_id": "7Server-JWS-3.1", "product_identification_helper": { "cpe": "cpe:/a:redhat:jboss_enterprise_web_server:3.1::el7" } } } ], "category": "product_family", "name": "Red Hat JBoss Web Server" }, { "branches": [ { "category": "product_version", "name": "tomcat-native-debuginfo-0:1.2.8-11.redhat_11.ep7.el6.x86_64", "product": { "name": "tomcat-native-debuginfo-0:1.2.8-11.redhat_11.ep7.el6.x86_64", "product_id": "tomcat-native-debuginfo-0:1.2.8-11.redhat_11.ep7.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat-native-debuginfo@1.2.8-11.redhat_11.ep7.el6?arch=x86_64" } } }, { "category": "product_version", "name": "tomcat-native-0:1.2.8-11.redhat_11.ep7.el6.x86_64", "product": { "name": "tomcat-native-0:1.2.8-11.redhat_11.ep7.el6.x86_64", "product_id": "tomcat-native-0:1.2.8-11.redhat_11.ep7.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat-native@1.2.8-11.redhat_11.ep7.el6?arch=x86_64" } } }, { "category": "product_version", "name": "tomcat-native-debuginfo-0:1.2.8-11.redhat_11.ep7.el7.x86_64", "product": { "name": "tomcat-native-debuginfo-0:1.2.8-11.redhat_11.ep7.el7.x86_64", "product_id": "tomcat-native-debuginfo-0:1.2.8-11.redhat_11.ep7.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat-native-debuginfo@1.2.8-11.redhat_11.ep7.el7?arch=x86_64" } } }, { "category": "product_version", "name": "tomcat-native-0:1.2.8-11.redhat_11.ep7.el7.x86_64", "product": { "name": "tomcat-native-0:1.2.8-11.redhat_11.ep7.el7.x86_64", "product_id": "tomcat-native-0:1.2.8-11.redhat_11.ep7.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat-native@1.2.8-11.redhat_11.ep7.el7?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "tomcat-native-debuginfo-0:1.2.8-11.redhat_11.ep7.el6.i686", "product": { "name": "tomcat-native-debuginfo-0:1.2.8-11.redhat_11.ep7.el6.i686", "product_id": "tomcat-native-debuginfo-0:1.2.8-11.redhat_11.ep7.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat-native-debuginfo@1.2.8-11.redhat_11.ep7.el6?arch=i686" } } }, { "category": "product_version", "name": "tomcat-native-0:1.2.8-11.redhat_11.ep7.el6.i686", "product": { "name": "tomcat-native-0:1.2.8-11.redhat_11.ep7.el6.i686", "product_id": "tomcat-native-0:1.2.8-11.redhat_11.ep7.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat-native@1.2.8-11.redhat_11.ep7.el6?arch=i686" } } } ], "category": "architecture", "name": "i686" }, { "branches": [ { "category": "product_version", "name": "tomcat-native-0:1.2.8-11.redhat_11.ep7.el6.src", "product": { "name": "tomcat-native-0:1.2.8-11.redhat_11.ep7.el6.src", "product_id": "tomcat-native-0:1.2.8-11.redhat_11.ep7.el6.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat-native@1.2.8-11.redhat_11.ep7.el6?arch=src" } } }, { "category": "product_version", "name": "mod_cluster-0:1.3.8-2.Final_redhat_2.1.ep7.el6.src", "product": { "name": "mod_cluster-0:1.3.8-2.Final_redhat_2.1.ep7.el6.src", "product_id": "mod_cluster-0:1.3.8-2.Final_redhat_2.1.ep7.el6.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_cluster@1.3.8-2.Final_redhat_2.1.ep7.el6?arch=src" } } }, { "category": "product_version", "name": "tomcat-vault-0:1.1.6-1.Final_redhat_1.1.ep7.el6.src", "product": { "name": "tomcat-vault-0:1.1.6-1.Final_redhat_1.1.ep7.el6.src", "product_id": "tomcat-vault-0:1.1.6-1.Final_redhat_1.1.ep7.el6.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat-vault@1.1.6-1.Final_redhat_1.1.ep7.el6?arch=src" } } }, { "category": "product_version", "name": "tomcat7-0:7.0.70-25.ep7.el6.src", "product": { "name": "tomcat7-0:7.0.70-25.ep7.el6.src", "product_id": "tomcat7-0:7.0.70-25.ep7.el6.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat7@7.0.70-25.ep7.el6?arch=src" } } }, { "category": "product_version", "name": "tomcat8-0:8.0.36-29.ep7.el6.src", "product": { "name": "tomcat8-0:8.0.36-29.ep7.el6.src", "product_id": "tomcat8-0:8.0.36-29.ep7.el6.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat8@8.0.36-29.ep7.el6?arch=src" } } }, { "category": "product_version", "name": "tomcat-native-0:1.2.8-11.redhat_11.ep7.el7.src", "product": { "name": "tomcat-native-0:1.2.8-11.redhat_11.ep7.el7.src", "product_id": "tomcat-native-0:1.2.8-11.redhat_11.ep7.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat-native@1.2.8-11.redhat_11.ep7.el7?arch=src" } } }, { "category": "product_version", "name": "mod_cluster-0:1.3.8-2.Final_redhat_2.1.ep7.el7.src", "product": { "name": "mod_cluster-0:1.3.8-2.Final_redhat_2.1.ep7.el7.src", "product_id": "mod_cluster-0:1.3.8-2.Final_redhat_2.1.ep7.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_cluster@1.3.8-2.Final_redhat_2.1.ep7.el7?arch=src" } } }, { "category": "product_version", "name": "tomcat-vault-0:1.1.6-1.Final_redhat_1.1.ep7.el7.src", "product": { "name": "tomcat-vault-0:1.1.6-1.Final_redhat_1.1.ep7.el7.src", "product_id": "tomcat-vault-0:1.1.6-1.Final_redhat_1.1.ep7.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat-vault@1.1.6-1.Final_redhat_1.1.ep7.el7?arch=src" } } }, { "category": "product_version", "name": "tomcat8-0:8.0.36-29.ep7.el7.src", "product": { "name": "tomcat8-0:8.0.36-29.ep7.el7.src", "product_id": "tomcat8-0:8.0.36-29.ep7.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat8@8.0.36-29.ep7.el7?arch=src" } } }, { "category": "product_version", "name": "tomcat7-0:7.0.70-25.ep7.el7.src", "product": { "name": "tomcat7-0:7.0.70-25.ep7.el7.src", "product_id": "tomcat7-0:7.0.70-25.ep7.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat7@7.0.70-25.ep7.el7?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "mod_cluster-tomcat8-0:1.3.8-2.Final_redhat_2.1.ep7.el6.noarch", "product": { "name": "mod_cluster-tomcat8-0:1.3.8-2.Final_redhat_2.1.ep7.el6.noarch", "product_id": "mod_cluster-tomcat8-0:1.3.8-2.Final_redhat_2.1.ep7.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_cluster-tomcat8@1.3.8-2.Final_redhat_2.1.ep7.el6?arch=noarch" } } }, { "category": "product_version", "name": "mod_cluster-0:1.3.8-2.Final_redhat_2.1.ep7.el6.noarch", "product": { "name": "mod_cluster-0:1.3.8-2.Final_redhat_2.1.ep7.el6.noarch", "product_id": "mod_cluster-0:1.3.8-2.Final_redhat_2.1.ep7.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_cluster@1.3.8-2.Final_redhat_2.1.ep7.el6?arch=noarch" } } }, { "category": "product_version", "name": "mod_cluster-tomcat7-0:1.3.8-2.Final_redhat_2.1.ep7.el6.noarch", "product": { "name": "mod_cluster-tomcat7-0:1.3.8-2.Final_redhat_2.1.ep7.el6.noarch", "product_id": "mod_cluster-tomcat7-0:1.3.8-2.Final_redhat_2.1.ep7.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_cluster-tomcat7@1.3.8-2.Final_redhat_2.1.ep7.el6?arch=noarch" } } }, { "category": "product_version", "name": "tomcat-vault-tomcat7-0:1.1.6-1.Final_redhat_1.1.ep7.el6.noarch", "product": { "name": "tomcat-vault-tomcat7-0:1.1.6-1.Final_redhat_1.1.ep7.el6.noarch", "product_id": "tomcat-vault-tomcat7-0:1.1.6-1.Final_redhat_1.1.ep7.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat-vault-tomcat7@1.1.6-1.Final_redhat_1.1.ep7.el6?arch=noarch" } } }, { "category": "product_version", "name": "tomcat-vault-0:1.1.6-1.Final_redhat_1.1.ep7.el6.noarch", "product": { "name": "tomcat-vault-0:1.1.6-1.Final_redhat_1.1.ep7.el6.noarch", "product_id": "tomcat-vault-0:1.1.6-1.Final_redhat_1.1.ep7.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat-vault@1.1.6-1.Final_redhat_1.1.ep7.el6?arch=noarch" } } }, { "category": "product_version", "name": "tomcat-vault-tomcat8-0:1.1.6-1.Final_redhat_1.1.ep7.el6.noarch", "product": { "name": "tomcat-vault-tomcat8-0:1.1.6-1.Final_redhat_1.1.ep7.el6.noarch", "product_id": "tomcat-vault-tomcat8-0:1.1.6-1.Final_redhat_1.1.ep7.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat-vault-tomcat8@1.1.6-1.Final_redhat_1.1.ep7.el6?arch=noarch" } } }, { "category": "product_version", "name": "tomcat7-webapps-0:7.0.70-25.ep7.el6.noarch", "product": { "name": "tomcat7-webapps-0:7.0.70-25.ep7.el6.noarch", "product_id": "tomcat7-webapps-0:7.0.70-25.ep7.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat7-webapps@7.0.70-25.ep7.el6?arch=noarch" } } }, { "category": "product_version", "name": "tomcat7-admin-webapps-0:7.0.70-25.ep7.el6.noarch", "product": { "name": "tomcat7-admin-webapps-0:7.0.70-25.ep7.el6.noarch", "product_id": "tomcat7-admin-webapps-0:7.0.70-25.ep7.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat7-admin-webapps@7.0.70-25.ep7.el6?arch=noarch" } } }, { "category": "product_version", "name": "tomcat7-docs-webapp-0:7.0.70-25.ep7.el6.noarch", "product": { "name": "tomcat7-docs-webapp-0:7.0.70-25.ep7.el6.noarch", "product_id": "tomcat7-docs-webapp-0:7.0.70-25.ep7.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat7-docs-webapp@7.0.70-25.ep7.el6?arch=noarch" } } }, { "category": "product_version", "name": "tomcat7-log4j-0:7.0.70-25.ep7.el6.noarch", "product": { "name": "tomcat7-log4j-0:7.0.70-25.ep7.el6.noarch", "product_id": "tomcat7-log4j-0:7.0.70-25.ep7.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat7-log4j@7.0.70-25.ep7.el6?arch=noarch" } } }, { "category": "product_version", "name": "tomcat7-lib-0:7.0.70-25.ep7.el6.noarch", "product": { "name": "tomcat7-lib-0:7.0.70-25.ep7.el6.noarch", "product_id": "tomcat7-lib-0:7.0.70-25.ep7.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat7-lib@7.0.70-25.ep7.el6?arch=noarch" } } }, { "category": "product_version", "name": "tomcat7-el-2.2-api-0:7.0.70-25.ep7.el6.noarch", "product": { "name": "tomcat7-el-2.2-api-0:7.0.70-25.ep7.el6.noarch", "product_id": "tomcat7-el-2.2-api-0:7.0.70-25.ep7.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat7-el-2.2-api@7.0.70-25.ep7.el6?arch=noarch" } } }, { "category": "product_version", "name": "tomcat7-jsp-2.2-api-0:7.0.70-25.ep7.el6.noarch", "product": { "name": "tomcat7-jsp-2.2-api-0:7.0.70-25.ep7.el6.noarch", "product_id": "tomcat7-jsp-2.2-api-0:7.0.70-25.ep7.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat7-jsp-2.2-api@7.0.70-25.ep7.el6?arch=noarch" } } }, { "category": "product_version", "name": "tomcat7-jsvc-0:7.0.70-25.ep7.el6.noarch", "product": { "name": "tomcat7-jsvc-0:7.0.70-25.ep7.el6.noarch", "product_id": "tomcat7-jsvc-0:7.0.70-25.ep7.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat7-jsvc@7.0.70-25.ep7.el6?arch=noarch" } } }, { "category": "product_version", "name": "tomcat7-servlet-3.0-api-0:7.0.70-25.ep7.el6.noarch", "product": { "name": "tomcat7-servlet-3.0-api-0:7.0.70-25.ep7.el6.noarch", "product_id": "tomcat7-servlet-3.0-api-0:7.0.70-25.ep7.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat7-servlet-3.0-api@7.0.70-25.ep7.el6?arch=noarch" } } }, { "category": "product_version", "name": "tomcat7-javadoc-0:7.0.70-25.ep7.el6.noarch", "product": { "name": "tomcat7-javadoc-0:7.0.70-25.ep7.el6.noarch", "product_id": "tomcat7-javadoc-0:7.0.70-25.ep7.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat7-javadoc@7.0.70-25.ep7.el6?arch=noarch" } } }, { "category": "product_version", "name": "tomcat7-0:7.0.70-25.ep7.el6.noarch", "product": { "name": "tomcat7-0:7.0.70-25.ep7.el6.noarch", "product_id": "tomcat7-0:7.0.70-25.ep7.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat7@7.0.70-25.ep7.el6?arch=noarch" } } }, { "category": "product_version", "name": "tomcat7-selinux-0:7.0.70-25.ep7.el6.noarch", "product": { "name": "tomcat7-selinux-0:7.0.70-25.ep7.el6.noarch", "product_id": "tomcat7-selinux-0:7.0.70-25.ep7.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat7-selinux@7.0.70-25.ep7.el6?arch=noarch" } } }, { "category": "product_version", "name": "tomcat8-webapps-0:8.0.36-29.ep7.el6.noarch", "product": { "name": "tomcat8-webapps-0:8.0.36-29.ep7.el6.noarch", "product_id": "tomcat8-webapps-0:8.0.36-29.ep7.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat8-webapps@8.0.36-29.ep7.el6?arch=noarch" } } }, { "category": "product_version", "name": "tomcat8-docs-webapp-0:8.0.36-29.ep7.el6.noarch", "product": { "name": "tomcat8-docs-webapp-0:8.0.36-29.ep7.el6.noarch", "product_id": "tomcat8-docs-webapp-0:8.0.36-29.ep7.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat8-docs-webapp@8.0.36-29.ep7.el6?arch=noarch" } } }, { "category": "product_version", "name": "tomcat8-log4j-0:8.0.36-29.ep7.el6.noarch", "product": { "name": "tomcat8-log4j-0:8.0.36-29.ep7.el6.noarch", "product_id": "tomcat8-log4j-0:8.0.36-29.ep7.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat8-log4j@8.0.36-29.ep7.el6?arch=noarch" } } }, { "category": "product_version", "name": "tomcat8-jsp-2.3-api-0:8.0.36-29.ep7.el6.noarch", "product": { "name": "tomcat8-jsp-2.3-api-0:8.0.36-29.ep7.el6.noarch", "product_id": "tomcat8-jsp-2.3-api-0:8.0.36-29.ep7.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat8-jsp-2.3-api@8.0.36-29.ep7.el6?arch=noarch" } } }, { "category": "product_version", "name": "tomcat8-jsvc-0:8.0.36-29.ep7.el6.noarch", "product": { "name": "tomcat8-jsvc-0:8.0.36-29.ep7.el6.noarch", "product_id": "tomcat8-jsvc-0:8.0.36-29.ep7.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat8-jsvc@8.0.36-29.ep7.el6?arch=noarch" } } }, { "category": "product_version", "name": "tomcat8-servlet-3.1-api-0:8.0.36-29.ep7.el6.noarch", "product": { "name": "tomcat8-servlet-3.1-api-0:8.0.36-29.ep7.el6.noarch", "product_id": "tomcat8-servlet-3.1-api-0:8.0.36-29.ep7.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat8-servlet-3.1-api@8.0.36-29.ep7.el6?arch=noarch" } } }, { "category": "product_version", "name": "tomcat8-javadoc-0:8.0.36-29.ep7.el6.noarch", "product": { "name": "tomcat8-javadoc-0:8.0.36-29.ep7.el6.noarch", "product_id": "tomcat8-javadoc-0:8.0.36-29.ep7.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat8-javadoc@8.0.36-29.ep7.el6?arch=noarch" } } }, { "category": "product_version", "name": "tomcat8-0:8.0.36-29.ep7.el6.noarch", "product": { "name": "tomcat8-0:8.0.36-29.ep7.el6.noarch", "product_id": "tomcat8-0:8.0.36-29.ep7.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat8@8.0.36-29.ep7.el6?arch=noarch" } } }, { "category": "product_version", "name": "tomcat8-lib-0:8.0.36-29.ep7.el6.noarch", "product": { "name": "tomcat8-lib-0:8.0.36-29.ep7.el6.noarch", "product_id": "tomcat8-lib-0:8.0.36-29.ep7.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat8-lib@8.0.36-29.ep7.el6?arch=noarch" } } }, { "category": "product_version", "name": "tomcat8-selinux-0:8.0.36-29.ep7.el6.noarch", "product": { "name": "tomcat8-selinux-0:8.0.36-29.ep7.el6.noarch", "product_id": "tomcat8-selinux-0:8.0.36-29.ep7.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat8-selinux@8.0.36-29.ep7.el6?arch=noarch" } } }, { "category": "product_version", "name": "tomcat8-el-2.2-api-0:8.0.36-29.ep7.el6.noarch", "product": { "name": "tomcat8-el-2.2-api-0:8.0.36-29.ep7.el6.noarch", "product_id": "tomcat8-el-2.2-api-0:8.0.36-29.ep7.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat8-el-2.2-api@8.0.36-29.ep7.el6?arch=noarch" } } }, { "category": "product_version", "name": "tomcat8-admin-webapps-0:8.0.36-29.ep7.el6.noarch", "product": { "name": "tomcat8-admin-webapps-0:8.0.36-29.ep7.el6.noarch", "product_id": "tomcat8-admin-webapps-0:8.0.36-29.ep7.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat8-admin-webapps@8.0.36-29.ep7.el6?arch=noarch" } } }, { "category": "product_version", "name": "mod_cluster-0:1.3.8-2.Final_redhat_2.1.ep7.el7.noarch", "product": { "name": "mod_cluster-0:1.3.8-2.Final_redhat_2.1.ep7.el7.noarch", "product_id": "mod_cluster-0:1.3.8-2.Final_redhat_2.1.ep7.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_cluster@1.3.8-2.Final_redhat_2.1.ep7.el7?arch=noarch" } } }, { "category": "product_version", "name": "mod_cluster-tomcat7-0:1.3.8-2.Final_redhat_2.1.ep7.el7.noarch", "product": { "name": "mod_cluster-tomcat7-0:1.3.8-2.Final_redhat_2.1.ep7.el7.noarch", "product_id": "mod_cluster-tomcat7-0:1.3.8-2.Final_redhat_2.1.ep7.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_cluster-tomcat7@1.3.8-2.Final_redhat_2.1.ep7.el7?arch=noarch" } } }, { "category": "product_version", "name": "mod_cluster-tomcat8-0:1.3.8-2.Final_redhat_2.1.ep7.el7.noarch", "product": { "name": "mod_cluster-tomcat8-0:1.3.8-2.Final_redhat_2.1.ep7.el7.noarch", "product_id": "mod_cluster-tomcat8-0:1.3.8-2.Final_redhat_2.1.ep7.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_cluster-tomcat8@1.3.8-2.Final_redhat_2.1.ep7.el7?arch=noarch" } } }, { "category": "product_version", "name": "tomcat-vault-tomcat7-0:1.1.6-1.Final_redhat_1.1.ep7.el7.noarch", "product": { "name": "tomcat-vault-tomcat7-0:1.1.6-1.Final_redhat_1.1.ep7.el7.noarch", "product_id": "tomcat-vault-tomcat7-0:1.1.6-1.Final_redhat_1.1.ep7.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat-vault-tomcat7@1.1.6-1.Final_redhat_1.1.ep7.el7?arch=noarch" } } }, { "category": "product_version", "name": "tomcat-vault-tomcat8-0:1.1.6-1.Final_redhat_1.1.ep7.el7.noarch", "product": { "name": "tomcat-vault-tomcat8-0:1.1.6-1.Final_redhat_1.1.ep7.el7.noarch", "product_id": "tomcat-vault-tomcat8-0:1.1.6-1.Final_redhat_1.1.ep7.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat-vault-tomcat8@1.1.6-1.Final_redhat_1.1.ep7.el7?arch=noarch" } } }, { "category": "product_version", "name": "tomcat-vault-0:1.1.6-1.Final_redhat_1.1.ep7.el7.noarch", "product": { "name": "tomcat-vault-0:1.1.6-1.Final_redhat_1.1.ep7.el7.noarch", "product_id": "tomcat-vault-0:1.1.6-1.Final_redhat_1.1.ep7.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat-vault@1.1.6-1.Final_redhat_1.1.ep7.el7?arch=noarch" } } }, { "category": "product_version", "name": "tomcat8-webapps-0:8.0.36-29.ep7.el7.noarch", "product": { "name": "tomcat8-webapps-0:8.0.36-29.ep7.el7.noarch", "product_id": "tomcat8-webapps-0:8.0.36-29.ep7.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat8-webapps@8.0.36-29.ep7.el7?arch=noarch" } } }, { "category": "product_version", "name": "tomcat8-log4j-0:8.0.36-29.ep7.el7.noarch", "product": { "name": "tomcat8-log4j-0:8.0.36-29.ep7.el7.noarch", "product_id": "tomcat8-log4j-0:8.0.36-29.ep7.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat8-log4j@8.0.36-29.ep7.el7?arch=noarch" } } }, { "category": "product_version", "name": "tomcat8-docs-webapp-0:8.0.36-29.ep7.el7.noarch", "product": { "name": "tomcat8-docs-webapp-0:8.0.36-29.ep7.el7.noarch", "product_id": "tomcat8-docs-webapp-0:8.0.36-29.ep7.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat8-docs-webapp@8.0.36-29.ep7.el7?arch=noarch" } } }, { "category": "product_version", "name": "tomcat8-jsp-2.3-api-0:8.0.36-29.ep7.el7.noarch", "product": { "name": "tomcat8-jsp-2.3-api-0:8.0.36-29.ep7.el7.noarch", "product_id": "tomcat8-jsp-2.3-api-0:8.0.36-29.ep7.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat8-jsp-2.3-api@8.0.36-29.ep7.el7?arch=noarch" } } }, { "category": "product_version", "name": "tomcat8-javadoc-0:8.0.36-29.ep7.el7.noarch", "product": { "name": "tomcat8-javadoc-0:8.0.36-29.ep7.el7.noarch", "product_id": "tomcat8-javadoc-0:8.0.36-29.ep7.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat8-javadoc@8.0.36-29.ep7.el7?arch=noarch" } } }, { "category": "product_version", "name": "tomcat8-selinux-0:8.0.36-29.ep7.el7.noarch", "product": { "name": "tomcat8-selinux-0:8.0.36-29.ep7.el7.noarch", "product_id": "tomcat8-selinux-0:8.0.36-29.ep7.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat8-selinux@8.0.36-29.ep7.el7?arch=noarch" } } }, { "category": "product_version", "name": "tomcat8-jsvc-0:8.0.36-29.ep7.el7.noarch", "product": { "name": "tomcat8-jsvc-0:8.0.36-29.ep7.el7.noarch", "product_id": "tomcat8-jsvc-0:8.0.36-29.ep7.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat8-jsvc@8.0.36-29.ep7.el7?arch=noarch" } } }, { "category": "product_version", "name": "tomcat8-0:8.0.36-29.ep7.el7.noarch", "product": { "name": "tomcat8-0:8.0.36-29.ep7.el7.noarch", "product_id": "tomcat8-0:8.0.36-29.ep7.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat8@8.0.36-29.ep7.el7?arch=noarch" } } }, { "category": "product_version", "name": "tomcat8-lib-0:8.0.36-29.ep7.el7.noarch", "product": { "name": "tomcat8-lib-0:8.0.36-29.ep7.el7.noarch", "product_id": "tomcat8-lib-0:8.0.36-29.ep7.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat8-lib@8.0.36-29.ep7.el7?arch=noarch" } } }, { "category": "product_version", "name": "tomcat8-el-2.2-api-0:8.0.36-29.ep7.el7.noarch", "product": { "name": "tomcat8-el-2.2-api-0:8.0.36-29.ep7.el7.noarch", "product_id": "tomcat8-el-2.2-api-0:8.0.36-29.ep7.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat8-el-2.2-api@8.0.36-29.ep7.el7?arch=noarch" } } }, { "category": "product_version", "name": "tomcat8-admin-webapps-0:8.0.36-29.ep7.el7.noarch", "product": { "name": "tomcat8-admin-webapps-0:8.0.36-29.ep7.el7.noarch", "product_id": "tomcat8-admin-webapps-0:8.0.36-29.ep7.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat8-admin-webapps@8.0.36-29.ep7.el7?arch=noarch" } } }, { "category": "product_version", "name": "tomcat8-servlet-3.1-api-0:8.0.36-29.ep7.el7.noarch", "product": { "name": "tomcat8-servlet-3.1-api-0:8.0.36-29.ep7.el7.noarch", "product_id": "tomcat8-servlet-3.1-api-0:8.0.36-29.ep7.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat8-servlet-3.1-api@8.0.36-29.ep7.el7?arch=noarch" } } }, { "category": "product_version", "name": "tomcat7-docs-webapp-0:7.0.70-25.ep7.el7.noarch", "product": { "name": "tomcat7-docs-webapp-0:7.0.70-25.ep7.el7.noarch", "product_id": "tomcat7-docs-webapp-0:7.0.70-25.ep7.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat7-docs-webapp@7.0.70-25.ep7.el7?arch=noarch" } } }, { "category": "product_version", "name": "tomcat7-log4j-0:7.0.70-25.ep7.el7.noarch", "product": { "name": "tomcat7-log4j-0:7.0.70-25.ep7.el7.noarch", "product_id": "tomcat7-log4j-0:7.0.70-25.ep7.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat7-log4j@7.0.70-25.ep7.el7?arch=noarch" } } }, { "category": "product_version", "name": "tomcat7-el-2.2-api-0:7.0.70-25.ep7.el7.noarch", "product": { "name": "tomcat7-el-2.2-api-0:7.0.70-25.ep7.el7.noarch", "product_id": "tomcat7-el-2.2-api-0:7.0.70-25.ep7.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat7-el-2.2-api@7.0.70-25.ep7.el7?arch=noarch" } } }, { "category": "product_version", "name": "tomcat7-lib-0:7.0.70-25.ep7.el7.noarch", "product": { "name": "tomcat7-lib-0:7.0.70-25.ep7.el7.noarch", "product_id": "tomcat7-lib-0:7.0.70-25.ep7.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat7-lib@7.0.70-25.ep7.el7?arch=noarch" } } }, { "category": "product_version", "name": "tomcat7-jsp-2.2-api-0:7.0.70-25.ep7.el7.noarch", "product": { "name": "tomcat7-jsp-2.2-api-0:7.0.70-25.ep7.el7.noarch", "product_id": "tomcat7-jsp-2.2-api-0:7.0.70-25.ep7.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat7-jsp-2.2-api@7.0.70-25.ep7.el7?arch=noarch" } } }, { "category": "product_version", "name": "tomcat7-servlet-3.0-api-0:7.0.70-25.ep7.el7.noarch", "product": { "name": "tomcat7-servlet-3.0-api-0:7.0.70-25.ep7.el7.noarch", "product_id": "tomcat7-servlet-3.0-api-0:7.0.70-25.ep7.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat7-servlet-3.0-api@7.0.70-25.ep7.el7?arch=noarch" } } }, { "category": "product_version", "name": "tomcat7-jsvc-0:7.0.70-25.ep7.el7.noarch", "product": { "name": "tomcat7-jsvc-0:7.0.70-25.ep7.el7.noarch", "product_id": "tomcat7-jsvc-0:7.0.70-25.ep7.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat7-jsvc@7.0.70-25.ep7.el7?arch=noarch" } } }, { "category": "product_version", "name": "tomcat7-webapps-0:7.0.70-25.ep7.el7.noarch", "product": { "name": "tomcat7-webapps-0:7.0.70-25.ep7.el7.noarch", "product_id": "tomcat7-webapps-0:7.0.70-25.ep7.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat7-webapps@7.0.70-25.ep7.el7?arch=noarch" } } }, { "category": "product_version", "name": "tomcat7-admin-webapps-0:7.0.70-25.ep7.el7.noarch", "product": { "name": "tomcat7-admin-webapps-0:7.0.70-25.ep7.el7.noarch", "product_id": "tomcat7-admin-webapps-0:7.0.70-25.ep7.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat7-admin-webapps@7.0.70-25.ep7.el7?arch=noarch" } } }, { "category": "product_version", "name": "tomcat7-javadoc-0:7.0.70-25.ep7.el7.noarch", "product": { "name": "tomcat7-javadoc-0:7.0.70-25.ep7.el7.noarch", "product_id": "tomcat7-javadoc-0:7.0.70-25.ep7.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat7-javadoc@7.0.70-25.ep7.el7?arch=noarch" } } }, { "category": "product_version", "name": "tomcat7-selinux-0:7.0.70-25.ep7.el7.noarch", "product": { "name": "tomcat7-selinux-0:7.0.70-25.ep7.el7.noarch", "product_id": "tomcat7-selinux-0:7.0.70-25.ep7.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat7-selinux@7.0.70-25.ep7.el7?arch=noarch" } } }, { "category": "product_version", "name": "tomcat7-0:7.0.70-25.ep7.el7.noarch", "product": { "name": "tomcat7-0:7.0.70-25.ep7.el7.noarch", "product_id": "tomcat7-0:7.0.70-25.ep7.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat7@7.0.70-25.ep7.el7?arch=noarch" } } } ], "category": "architecture", "name": "noarch" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "mod_cluster-0:1.3.8-2.Final_redhat_2.1.ep7.el6.noarch as a component of Red Hat JBoss Web Server 3.1 for RHEL 6", "product_id": "6Server-JWS-3.1:mod_cluster-0:1.3.8-2.Final_redhat_2.1.ep7.el6.noarch" }, "product_reference": "mod_cluster-0:1.3.8-2.Final_redhat_2.1.ep7.el6.noarch", "relates_to_product_reference": "6Server-JWS-3.1" }, { "category": "default_component_of", "full_product_name": { "name": "mod_cluster-0:1.3.8-2.Final_redhat_2.1.ep7.el6.src as a component of Red Hat JBoss Web Server 3.1 for RHEL 6", "product_id": "6Server-JWS-3.1:mod_cluster-0:1.3.8-2.Final_redhat_2.1.ep7.el6.src" }, "product_reference": "mod_cluster-0:1.3.8-2.Final_redhat_2.1.ep7.el6.src", "relates_to_product_reference": "6Server-JWS-3.1" }, { "category": "default_component_of", "full_product_name": { "name": "mod_cluster-tomcat7-0:1.3.8-2.Final_redhat_2.1.ep7.el6.noarch as a component of Red Hat JBoss Web Server 3.1 for RHEL 6", "product_id": "6Server-JWS-3.1:mod_cluster-tomcat7-0:1.3.8-2.Final_redhat_2.1.ep7.el6.noarch" }, "product_reference": "mod_cluster-tomcat7-0:1.3.8-2.Final_redhat_2.1.ep7.el6.noarch", "relates_to_product_reference": "6Server-JWS-3.1" }, { "category": "default_component_of", "full_product_name": { "name": "mod_cluster-tomcat8-0:1.3.8-2.Final_redhat_2.1.ep7.el6.noarch as a component of Red Hat JBoss Web Server 3.1 for RHEL 6", "product_id": "6Server-JWS-3.1:mod_cluster-tomcat8-0:1.3.8-2.Final_redhat_2.1.ep7.el6.noarch" }, "product_reference": "mod_cluster-tomcat8-0:1.3.8-2.Final_redhat_2.1.ep7.el6.noarch", "relates_to_product_reference": "6Server-JWS-3.1" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-native-0:1.2.8-11.redhat_11.ep7.el6.i686 as a component of Red Hat JBoss Web Server 3.1 for RHEL 6", "product_id": "6Server-JWS-3.1:tomcat-native-0:1.2.8-11.redhat_11.ep7.el6.i686" }, "product_reference": "tomcat-native-0:1.2.8-11.redhat_11.ep7.el6.i686", "relates_to_product_reference": "6Server-JWS-3.1" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-native-0:1.2.8-11.redhat_11.ep7.el6.src as a component of Red Hat JBoss Web Server 3.1 for RHEL 6", "product_id": "6Server-JWS-3.1:tomcat-native-0:1.2.8-11.redhat_11.ep7.el6.src" }, "product_reference": "tomcat-native-0:1.2.8-11.redhat_11.ep7.el6.src", "relates_to_product_reference": "6Server-JWS-3.1" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-native-0:1.2.8-11.redhat_11.ep7.el6.x86_64 as a component of Red Hat JBoss Web Server 3.1 for RHEL 6", "product_id": "6Server-JWS-3.1:tomcat-native-0:1.2.8-11.redhat_11.ep7.el6.x86_64" }, "product_reference": "tomcat-native-0:1.2.8-11.redhat_11.ep7.el6.x86_64", "relates_to_product_reference": "6Server-JWS-3.1" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-native-debuginfo-0:1.2.8-11.redhat_11.ep7.el6.i686 as a component of Red Hat JBoss Web Server 3.1 for RHEL 6", "product_id": "6Server-JWS-3.1:tomcat-native-debuginfo-0:1.2.8-11.redhat_11.ep7.el6.i686" }, "product_reference": "tomcat-native-debuginfo-0:1.2.8-11.redhat_11.ep7.el6.i686", "relates_to_product_reference": "6Server-JWS-3.1" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-native-debuginfo-0:1.2.8-11.redhat_11.ep7.el6.x86_64 as a component of Red Hat JBoss Web Server 3.1 for RHEL 6", "product_id": "6Server-JWS-3.1:tomcat-native-debuginfo-0:1.2.8-11.redhat_11.ep7.el6.x86_64" }, "product_reference": "tomcat-native-debuginfo-0:1.2.8-11.redhat_11.ep7.el6.x86_64", "relates_to_product_reference": "6Server-JWS-3.1" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-vault-0:1.1.6-1.Final_redhat_1.1.ep7.el6.noarch as a component of Red Hat JBoss Web Server 3.1 for RHEL 6", "product_id": "6Server-JWS-3.1:tomcat-vault-0:1.1.6-1.Final_redhat_1.1.ep7.el6.noarch" }, "product_reference": "tomcat-vault-0:1.1.6-1.Final_redhat_1.1.ep7.el6.noarch", "relates_to_product_reference": "6Server-JWS-3.1" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-vault-0:1.1.6-1.Final_redhat_1.1.ep7.el6.src as a component of Red Hat JBoss Web Server 3.1 for RHEL 6", "product_id": "6Server-JWS-3.1:tomcat-vault-0:1.1.6-1.Final_redhat_1.1.ep7.el6.src" }, "product_reference": "tomcat-vault-0:1.1.6-1.Final_redhat_1.1.ep7.el6.src", "relates_to_product_reference": "6Server-JWS-3.1" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-vault-tomcat7-0:1.1.6-1.Final_redhat_1.1.ep7.el6.noarch as a component of Red Hat JBoss Web Server 3.1 for RHEL 6", "product_id": "6Server-JWS-3.1:tomcat-vault-tomcat7-0:1.1.6-1.Final_redhat_1.1.ep7.el6.noarch" }, "product_reference": "tomcat-vault-tomcat7-0:1.1.6-1.Final_redhat_1.1.ep7.el6.noarch", "relates_to_product_reference": "6Server-JWS-3.1" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-vault-tomcat8-0:1.1.6-1.Final_redhat_1.1.ep7.el6.noarch as a component of Red Hat JBoss Web Server 3.1 for RHEL 6", "product_id": "6Server-JWS-3.1:tomcat-vault-tomcat8-0:1.1.6-1.Final_redhat_1.1.ep7.el6.noarch" }, "product_reference": "tomcat-vault-tomcat8-0:1.1.6-1.Final_redhat_1.1.ep7.el6.noarch", "relates_to_product_reference": "6Server-JWS-3.1" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat7-0:7.0.70-25.ep7.el6.noarch as a component of Red Hat JBoss Web Server 3.1 for RHEL 6", "product_id": "6Server-JWS-3.1:tomcat7-0:7.0.70-25.ep7.el6.noarch" }, "product_reference": "tomcat7-0:7.0.70-25.ep7.el6.noarch", "relates_to_product_reference": "6Server-JWS-3.1" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat7-0:7.0.70-25.ep7.el6.src as a component of Red Hat JBoss Web Server 3.1 for RHEL 6", "product_id": "6Server-JWS-3.1:tomcat7-0:7.0.70-25.ep7.el6.src" }, "product_reference": "tomcat7-0:7.0.70-25.ep7.el6.src", "relates_to_product_reference": "6Server-JWS-3.1" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat7-admin-webapps-0:7.0.70-25.ep7.el6.noarch as a component of Red Hat JBoss Web Server 3.1 for RHEL 6", "product_id": "6Server-JWS-3.1:tomcat7-admin-webapps-0:7.0.70-25.ep7.el6.noarch" }, "product_reference": "tomcat7-admin-webapps-0:7.0.70-25.ep7.el6.noarch", "relates_to_product_reference": "6Server-JWS-3.1" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat7-docs-webapp-0:7.0.70-25.ep7.el6.noarch as a component of Red Hat JBoss Web Server 3.1 for RHEL 6", "product_id": "6Server-JWS-3.1:tomcat7-docs-webapp-0:7.0.70-25.ep7.el6.noarch" }, "product_reference": "tomcat7-docs-webapp-0:7.0.70-25.ep7.el6.noarch", "relates_to_product_reference": "6Server-JWS-3.1" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat7-el-2.2-api-0:7.0.70-25.ep7.el6.noarch as a component of Red Hat JBoss Web Server 3.1 for RHEL 6", "product_id": "6Server-JWS-3.1:tomcat7-el-2.2-api-0:7.0.70-25.ep7.el6.noarch" }, "product_reference": "tomcat7-el-2.2-api-0:7.0.70-25.ep7.el6.noarch", "relates_to_product_reference": "6Server-JWS-3.1" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat7-javadoc-0:7.0.70-25.ep7.el6.noarch as a component of Red Hat JBoss Web Server 3.1 for RHEL 6", "product_id": "6Server-JWS-3.1:tomcat7-javadoc-0:7.0.70-25.ep7.el6.noarch" }, "product_reference": "tomcat7-javadoc-0:7.0.70-25.ep7.el6.noarch", "relates_to_product_reference": "6Server-JWS-3.1" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat7-jsp-2.2-api-0:7.0.70-25.ep7.el6.noarch as a component of Red Hat JBoss Web Server 3.1 for RHEL 6", "product_id": "6Server-JWS-3.1:tomcat7-jsp-2.2-api-0:7.0.70-25.ep7.el6.noarch" }, "product_reference": "tomcat7-jsp-2.2-api-0:7.0.70-25.ep7.el6.noarch", "relates_to_product_reference": "6Server-JWS-3.1" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat7-jsvc-0:7.0.70-25.ep7.el6.noarch as a component of Red Hat JBoss Web Server 3.1 for RHEL 6", "product_id": "6Server-JWS-3.1:tomcat7-jsvc-0:7.0.70-25.ep7.el6.noarch" }, "product_reference": "tomcat7-jsvc-0:7.0.70-25.ep7.el6.noarch", "relates_to_product_reference": "6Server-JWS-3.1" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat7-lib-0:7.0.70-25.ep7.el6.noarch as a component of Red Hat JBoss Web Server 3.1 for RHEL 6", "product_id": "6Server-JWS-3.1:tomcat7-lib-0:7.0.70-25.ep7.el6.noarch" }, "product_reference": "tomcat7-lib-0:7.0.70-25.ep7.el6.noarch", "relates_to_product_reference": "6Server-JWS-3.1" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat7-log4j-0:7.0.70-25.ep7.el6.noarch as a component of Red Hat JBoss Web Server 3.1 for RHEL 6", "product_id": "6Server-JWS-3.1:tomcat7-log4j-0:7.0.70-25.ep7.el6.noarch" }, "product_reference": "tomcat7-log4j-0:7.0.70-25.ep7.el6.noarch", "relates_to_product_reference": "6Server-JWS-3.1" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat7-selinux-0:7.0.70-25.ep7.el6.noarch as a component of Red Hat JBoss Web Server 3.1 for RHEL 6", "product_id": "6Server-JWS-3.1:tomcat7-selinux-0:7.0.70-25.ep7.el6.noarch" }, "product_reference": "tomcat7-selinux-0:7.0.70-25.ep7.el6.noarch", "relates_to_product_reference": "6Server-JWS-3.1" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat7-servlet-3.0-api-0:7.0.70-25.ep7.el6.noarch as a component of Red Hat JBoss Web Server 3.1 for RHEL 6", "product_id": "6Server-JWS-3.1:tomcat7-servlet-3.0-api-0:7.0.70-25.ep7.el6.noarch" }, "product_reference": "tomcat7-servlet-3.0-api-0:7.0.70-25.ep7.el6.noarch", "relates_to_product_reference": "6Server-JWS-3.1" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat7-webapps-0:7.0.70-25.ep7.el6.noarch as a component of Red Hat JBoss Web Server 3.1 for RHEL 6", "product_id": "6Server-JWS-3.1:tomcat7-webapps-0:7.0.70-25.ep7.el6.noarch" }, "product_reference": "tomcat7-webapps-0:7.0.70-25.ep7.el6.noarch", "relates_to_product_reference": "6Server-JWS-3.1" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat8-0:8.0.36-29.ep7.el6.noarch as a component of Red Hat JBoss Web Server 3.1 for RHEL 6", "product_id": "6Server-JWS-3.1:tomcat8-0:8.0.36-29.ep7.el6.noarch" }, "product_reference": "tomcat8-0:8.0.36-29.ep7.el6.noarch", "relates_to_product_reference": "6Server-JWS-3.1" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat8-0:8.0.36-29.ep7.el6.src as a component of Red Hat JBoss Web Server 3.1 for RHEL 6", "product_id": "6Server-JWS-3.1:tomcat8-0:8.0.36-29.ep7.el6.src" }, "product_reference": "tomcat8-0:8.0.36-29.ep7.el6.src", "relates_to_product_reference": "6Server-JWS-3.1" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat8-admin-webapps-0:8.0.36-29.ep7.el6.noarch as a component of Red Hat JBoss Web Server 3.1 for RHEL 6", "product_id": "6Server-JWS-3.1:tomcat8-admin-webapps-0:8.0.36-29.ep7.el6.noarch" }, "product_reference": "tomcat8-admin-webapps-0:8.0.36-29.ep7.el6.noarch", "relates_to_product_reference": "6Server-JWS-3.1" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat8-docs-webapp-0:8.0.36-29.ep7.el6.noarch as a component of Red Hat JBoss Web Server 3.1 for RHEL 6", "product_id": "6Server-JWS-3.1:tomcat8-docs-webapp-0:8.0.36-29.ep7.el6.noarch" }, "product_reference": "tomcat8-docs-webapp-0:8.0.36-29.ep7.el6.noarch", "relates_to_product_reference": "6Server-JWS-3.1" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat8-el-2.2-api-0:8.0.36-29.ep7.el6.noarch as a component of Red Hat JBoss Web Server 3.1 for RHEL 6", "product_id": "6Server-JWS-3.1:tomcat8-el-2.2-api-0:8.0.36-29.ep7.el6.noarch" }, "product_reference": "tomcat8-el-2.2-api-0:8.0.36-29.ep7.el6.noarch", "relates_to_product_reference": "6Server-JWS-3.1" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat8-javadoc-0:8.0.36-29.ep7.el6.noarch as a component of Red Hat JBoss Web Server 3.1 for RHEL 6", "product_id": "6Server-JWS-3.1:tomcat8-javadoc-0:8.0.36-29.ep7.el6.noarch" }, "product_reference": "tomcat8-javadoc-0:8.0.36-29.ep7.el6.noarch", "relates_to_product_reference": "6Server-JWS-3.1" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat8-jsp-2.3-api-0:8.0.36-29.ep7.el6.noarch as a component of Red Hat JBoss Web Server 3.1 for RHEL 6", "product_id": "6Server-JWS-3.1:tomcat8-jsp-2.3-api-0:8.0.36-29.ep7.el6.noarch" }, "product_reference": "tomcat8-jsp-2.3-api-0:8.0.36-29.ep7.el6.noarch", "relates_to_product_reference": "6Server-JWS-3.1" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat8-jsvc-0:8.0.36-29.ep7.el6.noarch as a component of Red Hat JBoss Web Server 3.1 for RHEL 6", "product_id": "6Server-JWS-3.1:tomcat8-jsvc-0:8.0.36-29.ep7.el6.noarch" }, "product_reference": "tomcat8-jsvc-0:8.0.36-29.ep7.el6.noarch", "relates_to_product_reference": "6Server-JWS-3.1" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat8-lib-0:8.0.36-29.ep7.el6.noarch as a component of Red Hat JBoss Web Server 3.1 for RHEL 6", "product_id": "6Server-JWS-3.1:tomcat8-lib-0:8.0.36-29.ep7.el6.noarch" }, "product_reference": "tomcat8-lib-0:8.0.36-29.ep7.el6.noarch", "relates_to_product_reference": "6Server-JWS-3.1" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat8-log4j-0:8.0.36-29.ep7.el6.noarch as a component of Red Hat JBoss Web Server 3.1 for RHEL 6", "product_id": "6Server-JWS-3.1:tomcat8-log4j-0:8.0.36-29.ep7.el6.noarch" }, "product_reference": "tomcat8-log4j-0:8.0.36-29.ep7.el6.noarch", "relates_to_product_reference": "6Server-JWS-3.1" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat8-selinux-0:8.0.36-29.ep7.el6.noarch as a component of Red Hat JBoss Web Server 3.1 for RHEL 6", "product_id": "6Server-JWS-3.1:tomcat8-selinux-0:8.0.36-29.ep7.el6.noarch" }, "product_reference": "tomcat8-selinux-0:8.0.36-29.ep7.el6.noarch", "relates_to_product_reference": "6Server-JWS-3.1" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat8-servlet-3.1-api-0:8.0.36-29.ep7.el6.noarch as a component of Red Hat JBoss Web Server 3.1 for RHEL 6", "product_id": "6Server-JWS-3.1:tomcat8-servlet-3.1-api-0:8.0.36-29.ep7.el6.noarch" }, "product_reference": "tomcat8-servlet-3.1-api-0:8.0.36-29.ep7.el6.noarch", "relates_to_product_reference": "6Server-JWS-3.1" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat8-webapps-0:8.0.36-29.ep7.el6.noarch as a component of Red Hat JBoss Web Server 3.1 for RHEL 6", "product_id": "6Server-JWS-3.1:tomcat8-webapps-0:8.0.36-29.ep7.el6.noarch" }, "product_reference": "tomcat8-webapps-0:8.0.36-29.ep7.el6.noarch", "relates_to_product_reference": "6Server-JWS-3.1" }, { "category": "default_component_of", "full_product_name": { "name": "mod_cluster-0:1.3.8-2.Final_redhat_2.1.ep7.el7.noarch as a component of Red Hat JBoss Web Server 3.1 for RHEL 7", "product_id": "7Server-JWS-3.1:mod_cluster-0:1.3.8-2.Final_redhat_2.1.ep7.el7.noarch" }, "product_reference": "mod_cluster-0:1.3.8-2.Final_redhat_2.1.ep7.el7.noarch", "relates_to_product_reference": "7Server-JWS-3.1" }, { "category": "default_component_of", "full_product_name": { "name": "mod_cluster-0:1.3.8-2.Final_redhat_2.1.ep7.el7.src as a component of Red Hat JBoss Web Server 3.1 for RHEL 7", "product_id": "7Server-JWS-3.1:mod_cluster-0:1.3.8-2.Final_redhat_2.1.ep7.el7.src" }, "product_reference": "mod_cluster-0:1.3.8-2.Final_redhat_2.1.ep7.el7.src", "relates_to_product_reference": "7Server-JWS-3.1" }, { "category": "default_component_of", "full_product_name": { "name": "mod_cluster-tomcat7-0:1.3.8-2.Final_redhat_2.1.ep7.el7.noarch as a component of Red Hat JBoss Web Server 3.1 for RHEL 7", "product_id": "7Server-JWS-3.1:mod_cluster-tomcat7-0:1.3.8-2.Final_redhat_2.1.ep7.el7.noarch" }, "product_reference": "mod_cluster-tomcat7-0:1.3.8-2.Final_redhat_2.1.ep7.el7.noarch", "relates_to_product_reference": "7Server-JWS-3.1" }, { "category": "default_component_of", "full_product_name": { "name": "mod_cluster-tomcat8-0:1.3.8-2.Final_redhat_2.1.ep7.el7.noarch as a component of Red Hat JBoss Web Server 3.1 for RHEL 7", "product_id": "7Server-JWS-3.1:mod_cluster-tomcat8-0:1.3.8-2.Final_redhat_2.1.ep7.el7.noarch" }, "product_reference": "mod_cluster-tomcat8-0:1.3.8-2.Final_redhat_2.1.ep7.el7.noarch", "relates_to_product_reference": "7Server-JWS-3.1" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-native-0:1.2.8-11.redhat_11.ep7.el7.src as a component of Red Hat JBoss Web Server 3.1 for RHEL 7", "product_id": "7Server-JWS-3.1:tomcat-native-0:1.2.8-11.redhat_11.ep7.el7.src" }, "product_reference": "tomcat-native-0:1.2.8-11.redhat_11.ep7.el7.src", "relates_to_product_reference": "7Server-JWS-3.1" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-native-0:1.2.8-11.redhat_11.ep7.el7.x86_64 as a component of Red Hat JBoss Web Server 3.1 for RHEL 7", "product_id": "7Server-JWS-3.1:tomcat-native-0:1.2.8-11.redhat_11.ep7.el7.x86_64" }, "product_reference": "tomcat-native-0:1.2.8-11.redhat_11.ep7.el7.x86_64", "relates_to_product_reference": "7Server-JWS-3.1" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-native-debuginfo-0:1.2.8-11.redhat_11.ep7.el7.x86_64 as a component of Red Hat JBoss Web Server 3.1 for RHEL 7", "product_id": "7Server-JWS-3.1:tomcat-native-debuginfo-0:1.2.8-11.redhat_11.ep7.el7.x86_64" }, "product_reference": "tomcat-native-debuginfo-0:1.2.8-11.redhat_11.ep7.el7.x86_64", "relates_to_product_reference": "7Server-JWS-3.1" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-vault-0:1.1.6-1.Final_redhat_1.1.ep7.el7.noarch as a component of Red Hat JBoss Web Server 3.1 for RHEL 7", "product_id": "7Server-JWS-3.1:tomcat-vault-0:1.1.6-1.Final_redhat_1.1.ep7.el7.noarch" }, "product_reference": "tomcat-vault-0:1.1.6-1.Final_redhat_1.1.ep7.el7.noarch", "relates_to_product_reference": "7Server-JWS-3.1" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-vault-0:1.1.6-1.Final_redhat_1.1.ep7.el7.src as a component of Red Hat JBoss Web Server 3.1 for RHEL 7", "product_id": "7Server-JWS-3.1:tomcat-vault-0:1.1.6-1.Final_redhat_1.1.ep7.el7.src" }, "product_reference": "tomcat-vault-0:1.1.6-1.Final_redhat_1.1.ep7.el7.src", "relates_to_product_reference": "7Server-JWS-3.1" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-vault-tomcat7-0:1.1.6-1.Final_redhat_1.1.ep7.el7.noarch as a component of Red Hat JBoss Web Server 3.1 for RHEL 7", "product_id": "7Server-JWS-3.1:tomcat-vault-tomcat7-0:1.1.6-1.Final_redhat_1.1.ep7.el7.noarch" }, "product_reference": "tomcat-vault-tomcat7-0:1.1.6-1.Final_redhat_1.1.ep7.el7.noarch", "relates_to_product_reference": "7Server-JWS-3.1" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-vault-tomcat8-0:1.1.6-1.Final_redhat_1.1.ep7.el7.noarch as a component of Red Hat JBoss Web Server 3.1 for RHEL 7", "product_id": "7Server-JWS-3.1:tomcat-vault-tomcat8-0:1.1.6-1.Final_redhat_1.1.ep7.el7.noarch" }, "product_reference": "tomcat-vault-tomcat8-0:1.1.6-1.Final_redhat_1.1.ep7.el7.noarch", "relates_to_product_reference": "7Server-JWS-3.1" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat7-0:7.0.70-25.ep7.el7.noarch as a component of Red Hat JBoss Web Server 3.1 for RHEL 7", "product_id": "7Server-JWS-3.1:tomcat7-0:7.0.70-25.ep7.el7.noarch" }, "product_reference": "tomcat7-0:7.0.70-25.ep7.el7.noarch", "relates_to_product_reference": "7Server-JWS-3.1" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat7-0:7.0.70-25.ep7.el7.src as a component of Red Hat JBoss Web Server 3.1 for RHEL 7", "product_id": "7Server-JWS-3.1:tomcat7-0:7.0.70-25.ep7.el7.src" }, "product_reference": "tomcat7-0:7.0.70-25.ep7.el7.src", "relates_to_product_reference": "7Server-JWS-3.1" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat7-admin-webapps-0:7.0.70-25.ep7.el7.noarch as a component of Red Hat JBoss Web Server 3.1 for RHEL 7", "product_id": "7Server-JWS-3.1:tomcat7-admin-webapps-0:7.0.70-25.ep7.el7.noarch" }, "product_reference": "tomcat7-admin-webapps-0:7.0.70-25.ep7.el7.noarch", "relates_to_product_reference": "7Server-JWS-3.1" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat7-docs-webapp-0:7.0.70-25.ep7.el7.noarch as a component of Red Hat JBoss Web Server 3.1 for RHEL 7", "product_id": "7Server-JWS-3.1:tomcat7-docs-webapp-0:7.0.70-25.ep7.el7.noarch" }, "product_reference": "tomcat7-docs-webapp-0:7.0.70-25.ep7.el7.noarch", "relates_to_product_reference": "7Server-JWS-3.1" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat7-el-2.2-api-0:7.0.70-25.ep7.el7.noarch as a component of Red Hat JBoss Web Server 3.1 for RHEL 7", "product_id": "7Server-JWS-3.1:tomcat7-el-2.2-api-0:7.0.70-25.ep7.el7.noarch" }, "product_reference": "tomcat7-el-2.2-api-0:7.0.70-25.ep7.el7.noarch", "relates_to_product_reference": "7Server-JWS-3.1" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat7-javadoc-0:7.0.70-25.ep7.el7.noarch as a component of Red Hat JBoss Web Server 3.1 for RHEL 7", "product_id": "7Server-JWS-3.1:tomcat7-javadoc-0:7.0.70-25.ep7.el7.noarch" }, "product_reference": "tomcat7-javadoc-0:7.0.70-25.ep7.el7.noarch", "relates_to_product_reference": "7Server-JWS-3.1" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat7-jsp-2.2-api-0:7.0.70-25.ep7.el7.noarch as a component of Red Hat JBoss Web Server 3.1 for RHEL 7", "product_id": "7Server-JWS-3.1:tomcat7-jsp-2.2-api-0:7.0.70-25.ep7.el7.noarch" }, "product_reference": "tomcat7-jsp-2.2-api-0:7.0.70-25.ep7.el7.noarch", "relates_to_product_reference": "7Server-JWS-3.1" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat7-jsvc-0:7.0.70-25.ep7.el7.noarch as a component of Red Hat JBoss Web Server 3.1 for RHEL 7", "product_id": "7Server-JWS-3.1:tomcat7-jsvc-0:7.0.70-25.ep7.el7.noarch" }, "product_reference": "tomcat7-jsvc-0:7.0.70-25.ep7.el7.noarch", "relates_to_product_reference": "7Server-JWS-3.1" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat7-lib-0:7.0.70-25.ep7.el7.noarch as a component of Red Hat JBoss Web Server 3.1 for RHEL 7", "product_id": "7Server-JWS-3.1:tomcat7-lib-0:7.0.70-25.ep7.el7.noarch" }, "product_reference": "tomcat7-lib-0:7.0.70-25.ep7.el7.noarch", "relates_to_product_reference": "7Server-JWS-3.1" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat7-log4j-0:7.0.70-25.ep7.el7.noarch as a component of Red Hat JBoss Web Server 3.1 for RHEL 7", "product_id": "7Server-JWS-3.1:tomcat7-log4j-0:7.0.70-25.ep7.el7.noarch" }, "product_reference": "tomcat7-log4j-0:7.0.70-25.ep7.el7.noarch", "relates_to_product_reference": "7Server-JWS-3.1" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat7-selinux-0:7.0.70-25.ep7.el7.noarch as a component of Red Hat JBoss Web Server 3.1 for RHEL 7", "product_id": "7Server-JWS-3.1:tomcat7-selinux-0:7.0.70-25.ep7.el7.noarch" }, "product_reference": "tomcat7-selinux-0:7.0.70-25.ep7.el7.noarch", "relates_to_product_reference": "7Server-JWS-3.1" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat7-servlet-3.0-api-0:7.0.70-25.ep7.el7.noarch as a component of Red Hat JBoss Web Server 3.1 for RHEL 7", "product_id": "7Server-JWS-3.1:tomcat7-servlet-3.0-api-0:7.0.70-25.ep7.el7.noarch" }, "product_reference": "tomcat7-servlet-3.0-api-0:7.0.70-25.ep7.el7.noarch", "relates_to_product_reference": "7Server-JWS-3.1" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat7-webapps-0:7.0.70-25.ep7.el7.noarch as a component of Red Hat JBoss Web Server 3.1 for RHEL 7", "product_id": "7Server-JWS-3.1:tomcat7-webapps-0:7.0.70-25.ep7.el7.noarch" }, "product_reference": "tomcat7-webapps-0:7.0.70-25.ep7.el7.noarch", "relates_to_product_reference": "7Server-JWS-3.1" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat8-0:8.0.36-29.ep7.el7.noarch as a component of Red Hat JBoss Web Server 3.1 for RHEL 7", "product_id": "7Server-JWS-3.1:tomcat8-0:8.0.36-29.ep7.el7.noarch" }, "product_reference": "tomcat8-0:8.0.36-29.ep7.el7.noarch", "relates_to_product_reference": "7Server-JWS-3.1" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat8-0:8.0.36-29.ep7.el7.src as a component of Red Hat JBoss Web Server 3.1 for RHEL 7", "product_id": "7Server-JWS-3.1:tomcat8-0:8.0.36-29.ep7.el7.src" }, "product_reference": "tomcat8-0:8.0.36-29.ep7.el7.src", "relates_to_product_reference": "7Server-JWS-3.1" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat8-admin-webapps-0:8.0.36-29.ep7.el7.noarch as a component of Red Hat JBoss Web Server 3.1 for RHEL 7", "product_id": "7Server-JWS-3.1:tomcat8-admin-webapps-0:8.0.36-29.ep7.el7.noarch" }, "product_reference": "tomcat8-admin-webapps-0:8.0.36-29.ep7.el7.noarch", "relates_to_product_reference": "7Server-JWS-3.1" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat8-docs-webapp-0:8.0.36-29.ep7.el7.noarch as a component of Red Hat JBoss Web Server 3.1 for RHEL 7", "product_id": "7Server-JWS-3.1:tomcat8-docs-webapp-0:8.0.36-29.ep7.el7.noarch" }, "product_reference": "tomcat8-docs-webapp-0:8.0.36-29.ep7.el7.noarch", "relates_to_product_reference": "7Server-JWS-3.1" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat8-el-2.2-api-0:8.0.36-29.ep7.el7.noarch as a component of Red Hat JBoss Web Server 3.1 for RHEL 7", "product_id": "7Server-JWS-3.1:tomcat8-el-2.2-api-0:8.0.36-29.ep7.el7.noarch" }, "product_reference": "tomcat8-el-2.2-api-0:8.0.36-29.ep7.el7.noarch", "relates_to_product_reference": "7Server-JWS-3.1" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat8-javadoc-0:8.0.36-29.ep7.el7.noarch as a component of Red Hat JBoss Web Server 3.1 for RHEL 7", "product_id": "7Server-JWS-3.1:tomcat8-javadoc-0:8.0.36-29.ep7.el7.noarch" }, "product_reference": "tomcat8-javadoc-0:8.0.36-29.ep7.el7.noarch", "relates_to_product_reference": "7Server-JWS-3.1" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat8-jsp-2.3-api-0:8.0.36-29.ep7.el7.noarch as a component of Red Hat JBoss Web Server 3.1 for RHEL 7", "product_id": "7Server-JWS-3.1:tomcat8-jsp-2.3-api-0:8.0.36-29.ep7.el7.noarch" }, "product_reference": "tomcat8-jsp-2.3-api-0:8.0.36-29.ep7.el7.noarch", "relates_to_product_reference": "7Server-JWS-3.1" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat8-jsvc-0:8.0.36-29.ep7.el7.noarch as a component of Red Hat JBoss Web Server 3.1 for RHEL 7", "product_id": "7Server-JWS-3.1:tomcat8-jsvc-0:8.0.36-29.ep7.el7.noarch" }, "product_reference": "tomcat8-jsvc-0:8.0.36-29.ep7.el7.noarch", "relates_to_product_reference": "7Server-JWS-3.1" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat8-lib-0:8.0.36-29.ep7.el7.noarch as a component of Red Hat JBoss Web Server 3.1 for RHEL 7", "product_id": "7Server-JWS-3.1:tomcat8-lib-0:8.0.36-29.ep7.el7.noarch" }, "product_reference": "tomcat8-lib-0:8.0.36-29.ep7.el7.noarch", "relates_to_product_reference": "7Server-JWS-3.1" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat8-log4j-0:8.0.36-29.ep7.el7.noarch as a component of Red Hat JBoss Web Server 3.1 for RHEL 7", "product_id": "7Server-JWS-3.1:tomcat8-log4j-0:8.0.36-29.ep7.el7.noarch" }, "product_reference": "tomcat8-log4j-0:8.0.36-29.ep7.el7.noarch", "relates_to_product_reference": "7Server-JWS-3.1" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat8-selinux-0:8.0.36-29.ep7.el7.noarch as a component of Red Hat JBoss Web Server 3.1 for RHEL 7", "product_id": "7Server-JWS-3.1:tomcat8-selinux-0:8.0.36-29.ep7.el7.noarch" }, "product_reference": "tomcat8-selinux-0:8.0.36-29.ep7.el7.noarch", "relates_to_product_reference": "7Server-JWS-3.1" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat8-servlet-3.1-api-0:8.0.36-29.ep7.el7.noarch as a component of Red Hat JBoss Web Server 3.1 for RHEL 7", "product_id": "7Server-JWS-3.1:tomcat8-servlet-3.1-api-0:8.0.36-29.ep7.el7.noarch" }, "product_reference": "tomcat8-servlet-3.1-api-0:8.0.36-29.ep7.el7.noarch", "relates_to_product_reference": "7Server-JWS-3.1" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat8-webapps-0:8.0.36-29.ep7.el7.noarch as a component of Red Hat JBoss Web Server 3.1 for RHEL 7", "product_id": "7Server-JWS-3.1:tomcat8-webapps-0:8.0.36-29.ep7.el7.noarch" }, "product_reference": "tomcat8-webapps-0:8.0.36-29.ep7.el7.noarch", "relates_to_product_reference": "7Server-JWS-3.1" } ] }, "vulnerabilities": [ { "cve": "CVE-2017-12613", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "discovery_date": "2017-10-24T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1506523" } ], "notes": [ { "category": "description", "text": "An out-of-bounds array dereference was found in apr_time_exp_get(). An attacker could abuse an unvalidated usage of this function to cause a denial of service or potentially lead to data leak.", "title": "Vulnerability description" }, { "category": "summary", "text": "apr: Out-of-bounds array deref in apr_time_exp*() functions", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Server-JWS-3.1:mod_cluster-0:1.3.8-2.Final_redhat_2.1.ep7.el6.noarch", "6Server-JWS-3.1:mod_cluster-0:1.3.8-2.Final_redhat_2.1.ep7.el6.src", "6Server-JWS-3.1:mod_cluster-tomcat7-0:1.3.8-2.Final_redhat_2.1.ep7.el6.noarch", "6Server-JWS-3.1:mod_cluster-tomcat8-0:1.3.8-2.Final_redhat_2.1.ep7.el6.noarch", "6Server-JWS-3.1:tomcat-native-0:1.2.8-11.redhat_11.ep7.el6.i686", "6Server-JWS-3.1:tomcat-native-0:1.2.8-11.redhat_11.ep7.el6.src", "6Server-JWS-3.1:tomcat-native-0:1.2.8-11.redhat_11.ep7.el6.x86_64", "6Server-JWS-3.1:tomcat-native-debuginfo-0:1.2.8-11.redhat_11.ep7.el6.i686", "6Server-JWS-3.1:tomcat-native-debuginfo-0:1.2.8-11.redhat_11.ep7.el6.x86_64", "6Server-JWS-3.1:tomcat-vault-0:1.1.6-1.Final_redhat_1.1.ep7.el6.noarch", "6Server-JWS-3.1:tomcat-vault-0:1.1.6-1.Final_redhat_1.1.ep7.el6.src", "6Server-JWS-3.1:tomcat-vault-tomcat7-0:1.1.6-1.Final_redhat_1.1.ep7.el6.noarch", "6Server-JWS-3.1:tomcat-vault-tomcat8-0:1.1.6-1.Final_redhat_1.1.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-0:7.0.70-25.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-0:7.0.70-25.ep7.el6.src", "6Server-JWS-3.1:tomcat7-admin-webapps-0:7.0.70-25.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-docs-webapp-0:7.0.70-25.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-el-2.2-api-0:7.0.70-25.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-javadoc-0:7.0.70-25.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-jsp-2.2-api-0:7.0.70-25.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-jsvc-0:7.0.70-25.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-lib-0:7.0.70-25.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-log4j-0:7.0.70-25.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-selinux-0:7.0.70-25.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-servlet-3.0-api-0:7.0.70-25.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-webapps-0:7.0.70-25.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-0:8.0.36-29.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-0:8.0.36-29.ep7.el6.src", "6Server-JWS-3.1:tomcat8-admin-webapps-0:8.0.36-29.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-docs-webapp-0:8.0.36-29.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-el-2.2-api-0:8.0.36-29.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-javadoc-0:8.0.36-29.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-jsp-2.3-api-0:8.0.36-29.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-jsvc-0:8.0.36-29.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-lib-0:8.0.36-29.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-log4j-0:8.0.36-29.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-selinux-0:8.0.36-29.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-servlet-3.1-api-0:8.0.36-29.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-webapps-0:8.0.36-29.ep7.el6.noarch", "7Server-JWS-3.1:mod_cluster-0:1.3.8-2.Final_redhat_2.1.ep7.el7.noarch", "7Server-JWS-3.1:mod_cluster-0:1.3.8-2.Final_redhat_2.1.ep7.el7.src", "7Server-JWS-3.1:mod_cluster-tomcat7-0:1.3.8-2.Final_redhat_2.1.ep7.el7.noarch", "7Server-JWS-3.1:mod_cluster-tomcat8-0:1.3.8-2.Final_redhat_2.1.ep7.el7.noarch", "7Server-JWS-3.1:tomcat-native-0:1.2.8-11.redhat_11.ep7.el7.src", "7Server-JWS-3.1:tomcat-native-0:1.2.8-11.redhat_11.ep7.el7.x86_64", "7Server-JWS-3.1:tomcat-native-debuginfo-0:1.2.8-11.redhat_11.ep7.el7.x86_64", "7Server-JWS-3.1:tomcat-vault-0:1.1.6-1.Final_redhat_1.1.ep7.el7.noarch", "7Server-JWS-3.1:tomcat-vault-0:1.1.6-1.Final_redhat_1.1.ep7.el7.src", "7Server-JWS-3.1:tomcat-vault-tomcat7-0:1.1.6-1.Final_redhat_1.1.ep7.el7.noarch", "7Server-JWS-3.1:tomcat-vault-tomcat8-0:1.1.6-1.Final_redhat_1.1.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-0:7.0.70-25.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-0:7.0.70-25.ep7.el7.src", "7Server-JWS-3.1:tomcat7-admin-webapps-0:7.0.70-25.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-docs-webapp-0:7.0.70-25.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-el-2.2-api-0:7.0.70-25.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-javadoc-0:7.0.70-25.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-jsp-2.2-api-0:7.0.70-25.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-jsvc-0:7.0.70-25.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-lib-0:7.0.70-25.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-log4j-0:7.0.70-25.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-selinux-0:7.0.70-25.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-servlet-3.0-api-0:7.0.70-25.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-webapps-0:7.0.70-25.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-0:8.0.36-29.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-0:8.0.36-29.ep7.el7.src", "7Server-JWS-3.1:tomcat8-admin-webapps-0:8.0.36-29.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-docs-webapp-0:8.0.36-29.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-el-2.2-api-0:8.0.36-29.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-javadoc-0:8.0.36-29.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-jsp-2.3-api-0:8.0.36-29.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-jsvc-0:8.0.36-29.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-lib-0:8.0.36-29.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-log4j-0:8.0.36-29.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-selinux-0:8.0.36-29.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-servlet-3.1-api-0:8.0.36-29.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-webapps-0:8.0.36-29.ep7.el7.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2017-12613" }, { "category": "external", "summary": "RHBZ#1506523", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1506523" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2017-12613", "url": "https://www.cve.org/CVERecord?id=CVE-2017-12613" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-12613", "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-12613" }, { "category": "external", "summary": "http://www.apache.org/dist/apr/Announcement1.x.html", "url": "http://www.apache.org/dist/apr/Announcement1.x.html" } ], "release_date": "2017-10-23T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-03-07T15:21:52+00:00", "details": "Before applying the update, back up your existing Red Hat JBoss Web Server installation (including all applications and configuration files).\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "6Server-JWS-3.1:mod_cluster-0:1.3.8-2.Final_redhat_2.1.ep7.el6.noarch", "6Server-JWS-3.1:mod_cluster-0:1.3.8-2.Final_redhat_2.1.ep7.el6.src", "6Server-JWS-3.1:mod_cluster-tomcat7-0:1.3.8-2.Final_redhat_2.1.ep7.el6.noarch", "6Server-JWS-3.1:mod_cluster-tomcat8-0:1.3.8-2.Final_redhat_2.1.ep7.el6.noarch", "6Server-JWS-3.1:tomcat-native-0:1.2.8-11.redhat_11.ep7.el6.i686", "6Server-JWS-3.1:tomcat-native-0:1.2.8-11.redhat_11.ep7.el6.src", "6Server-JWS-3.1:tomcat-native-0:1.2.8-11.redhat_11.ep7.el6.x86_64", "6Server-JWS-3.1:tomcat-native-debuginfo-0:1.2.8-11.redhat_11.ep7.el6.i686", "6Server-JWS-3.1:tomcat-native-debuginfo-0:1.2.8-11.redhat_11.ep7.el6.x86_64", "6Server-JWS-3.1:tomcat-vault-0:1.1.6-1.Final_redhat_1.1.ep7.el6.noarch", "6Server-JWS-3.1:tomcat-vault-0:1.1.6-1.Final_redhat_1.1.ep7.el6.src", "6Server-JWS-3.1:tomcat-vault-tomcat7-0:1.1.6-1.Final_redhat_1.1.ep7.el6.noarch", "6Server-JWS-3.1:tomcat-vault-tomcat8-0:1.1.6-1.Final_redhat_1.1.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-0:7.0.70-25.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-0:7.0.70-25.ep7.el6.src", "6Server-JWS-3.1:tomcat7-admin-webapps-0:7.0.70-25.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-docs-webapp-0:7.0.70-25.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-el-2.2-api-0:7.0.70-25.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-javadoc-0:7.0.70-25.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-jsp-2.2-api-0:7.0.70-25.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-jsvc-0:7.0.70-25.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-lib-0:7.0.70-25.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-log4j-0:7.0.70-25.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-selinux-0:7.0.70-25.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-servlet-3.0-api-0:7.0.70-25.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-webapps-0:7.0.70-25.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-0:8.0.36-29.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-0:8.0.36-29.ep7.el6.src", "6Server-JWS-3.1:tomcat8-admin-webapps-0:8.0.36-29.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-docs-webapp-0:8.0.36-29.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-el-2.2-api-0:8.0.36-29.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-javadoc-0:8.0.36-29.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-jsp-2.3-api-0:8.0.36-29.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-jsvc-0:8.0.36-29.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-lib-0:8.0.36-29.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-log4j-0:8.0.36-29.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-selinux-0:8.0.36-29.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-servlet-3.1-api-0:8.0.36-29.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-webapps-0:8.0.36-29.ep7.el6.noarch", "7Server-JWS-3.1:mod_cluster-0:1.3.8-2.Final_redhat_2.1.ep7.el7.noarch", "7Server-JWS-3.1:mod_cluster-0:1.3.8-2.Final_redhat_2.1.ep7.el7.src", "7Server-JWS-3.1:mod_cluster-tomcat7-0:1.3.8-2.Final_redhat_2.1.ep7.el7.noarch", "7Server-JWS-3.1:mod_cluster-tomcat8-0:1.3.8-2.Final_redhat_2.1.ep7.el7.noarch", "7Server-JWS-3.1:tomcat-native-0:1.2.8-11.redhat_11.ep7.el7.src", "7Server-JWS-3.1:tomcat-native-0:1.2.8-11.redhat_11.ep7.el7.x86_64", "7Server-JWS-3.1:tomcat-native-debuginfo-0:1.2.8-11.redhat_11.ep7.el7.x86_64", "7Server-JWS-3.1:tomcat-vault-0:1.1.6-1.Final_redhat_1.1.ep7.el7.noarch", "7Server-JWS-3.1:tomcat-vault-0:1.1.6-1.Final_redhat_1.1.ep7.el7.src", "7Server-JWS-3.1:tomcat-vault-tomcat7-0:1.1.6-1.Final_redhat_1.1.ep7.el7.noarch", "7Server-JWS-3.1:tomcat-vault-tomcat8-0:1.1.6-1.Final_redhat_1.1.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-0:7.0.70-25.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-0:7.0.70-25.ep7.el7.src", "7Server-JWS-3.1:tomcat7-admin-webapps-0:7.0.70-25.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-docs-webapp-0:7.0.70-25.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-el-2.2-api-0:7.0.70-25.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-javadoc-0:7.0.70-25.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-jsp-2.2-api-0:7.0.70-25.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-jsvc-0:7.0.70-25.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-lib-0:7.0.70-25.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-log4j-0:7.0.70-25.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-selinux-0:7.0.70-25.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-servlet-3.0-api-0:7.0.70-25.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-webapps-0:7.0.70-25.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-0:8.0.36-29.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-0:8.0.36-29.ep7.el7.src", "7Server-JWS-3.1:tomcat8-admin-webapps-0:8.0.36-29.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-docs-webapp-0:8.0.36-29.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-el-2.2-api-0:8.0.36-29.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-javadoc-0:8.0.36-29.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-jsp-2.3-api-0:8.0.36-29.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-jsvc-0:8.0.36-29.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-lib-0:8.0.36-29.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-log4j-0:8.0.36-29.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-selinux-0:8.0.36-29.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-servlet-3.1-api-0:8.0.36-29.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-webapps-0:8.0.36-29.ep7.el7.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2018:0466" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.4, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H", "version": "3.0" }, "products": [ "6Server-JWS-3.1:mod_cluster-0:1.3.8-2.Final_redhat_2.1.ep7.el6.noarch", "6Server-JWS-3.1:mod_cluster-0:1.3.8-2.Final_redhat_2.1.ep7.el6.src", "6Server-JWS-3.1:mod_cluster-tomcat7-0:1.3.8-2.Final_redhat_2.1.ep7.el6.noarch", "6Server-JWS-3.1:mod_cluster-tomcat8-0:1.3.8-2.Final_redhat_2.1.ep7.el6.noarch", "6Server-JWS-3.1:tomcat-native-0:1.2.8-11.redhat_11.ep7.el6.i686", "6Server-JWS-3.1:tomcat-native-0:1.2.8-11.redhat_11.ep7.el6.src", "6Server-JWS-3.1:tomcat-native-0:1.2.8-11.redhat_11.ep7.el6.x86_64", "6Server-JWS-3.1:tomcat-native-debuginfo-0:1.2.8-11.redhat_11.ep7.el6.i686", "6Server-JWS-3.1:tomcat-native-debuginfo-0:1.2.8-11.redhat_11.ep7.el6.x86_64", "6Server-JWS-3.1:tomcat-vault-0:1.1.6-1.Final_redhat_1.1.ep7.el6.noarch", "6Server-JWS-3.1:tomcat-vault-0:1.1.6-1.Final_redhat_1.1.ep7.el6.src", "6Server-JWS-3.1:tomcat-vault-tomcat7-0:1.1.6-1.Final_redhat_1.1.ep7.el6.noarch", "6Server-JWS-3.1:tomcat-vault-tomcat8-0:1.1.6-1.Final_redhat_1.1.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-0:7.0.70-25.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-0:7.0.70-25.ep7.el6.src", "6Server-JWS-3.1:tomcat7-admin-webapps-0:7.0.70-25.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-docs-webapp-0:7.0.70-25.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-el-2.2-api-0:7.0.70-25.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-javadoc-0:7.0.70-25.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-jsp-2.2-api-0:7.0.70-25.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-jsvc-0:7.0.70-25.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-lib-0:7.0.70-25.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-log4j-0:7.0.70-25.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-selinux-0:7.0.70-25.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-servlet-3.0-api-0:7.0.70-25.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-webapps-0:7.0.70-25.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-0:8.0.36-29.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-0:8.0.36-29.ep7.el6.src", "6Server-JWS-3.1:tomcat8-admin-webapps-0:8.0.36-29.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-docs-webapp-0:8.0.36-29.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-el-2.2-api-0:8.0.36-29.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-javadoc-0:8.0.36-29.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-jsp-2.3-api-0:8.0.36-29.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-jsvc-0:8.0.36-29.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-lib-0:8.0.36-29.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-log4j-0:8.0.36-29.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-selinux-0:8.0.36-29.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-servlet-3.1-api-0:8.0.36-29.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-webapps-0:8.0.36-29.ep7.el6.noarch", "7Server-JWS-3.1:mod_cluster-0:1.3.8-2.Final_redhat_2.1.ep7.el7.noarch", "7Server-JWS-3.1:mod_cluster-0:1.3.8-2.Final_redhat_2.1.ep7.el7.src", "7Server-JWS-3.1:mod_cluster-tomcat7-0:1.3.8-2.Final_redhat_2.1.ep7.el7.noarch", "7Server-JWS-3.1:mod_cluster-tomcat8-0:1.3.8-2.Final_redhat_2.1.ep7.el7.noarch", "7Server-JWS-3.1:tomcat-native-0:1.2.8-11.redhat_11.ep7.el7.src", "7Server-JWS-3.1:tomcat-native-0:1.2.8-11.redhat_11.ep7.el7.x86_64", "7Server-JWS-3.1:tomcat-native-debuginfo-0:1.2.8-11.redhat_11.ep7.el7.x86_64", "7Server-JWS-3.1:tomcat-vault-0:1.1.6-1.Final_redhat_1.1.ep7.el7.noarch", "7Server-JWS-3.1:tomcat-vault-0:1.1.6-1.Final_redhat_1.1.ep7.el7.src", "7Server-JWS-3.1:tomcat-vault-tomcat7-0:1.1.6-1.Final_redhat_1.1.ep7.el7.noarch", "7Server-JWS-3.1:tomcat-vault-tomcat8-0:1.1.6-1.Final_redhat_1.1.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-0:7.0.70-25.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-0:7.0.70-25.ep7.el7.src", "7Server-JWS-3.1:tomcat7-admin-webapps-0:7.0.70-25.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-docs-webapp-0:7.0.70-25.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-el-2.2-api-0:7.0.70-25.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-javadoc-0:7.0.70-25.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-jsp-2.2-api-0:7.0.70-25.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-jsvc-0:7.0.70-25.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-lib-0:7.0.70-25.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-log4j-0:7.0.70-25.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-selinux-0:7.0.70-25.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-servlet-3.0-api-0:7.0.70-25.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-webapps-0:7.0.70-25.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-0:8.0.36-29.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-0:8.0.36-29.ep7.el7.src", "7Server-JWS-3.1:tomcat8-admin-webapps-0:8.0.36-29.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-docs-webapp-0:8.0.36-29.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-el-2.2-api-0:8.0.36-29.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-javadoc-0:8.0.36-29.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-jsp-2.3-api-0:8.0.36-29.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-jsvc-0:8.0.36-29.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-lib-0:8.0.36-29.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-log4j-0:8.0.36-29.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-selinux-0:8.0.36-29.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-servlet-3.1-api-0:8.0.36-29.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-webapps-0:8.0.36-29.ep7.el7.noarch" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "apr: Out-of-bounds array deref in apr_time_exp*() functions" }, { "cve": "CVE-2017-12615", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2017-09-19T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1493220" } ], "notes": [ { "category": "description", "text": "A vulnerability was discovered in Tomcat where if a servlet context was configured with readonly=false and HTTP PUT requests were allowed, an attacker could upload a JSP file to that context and achieve code execution.", "title": "Vulnerability description" }, { "category": "summary", "text": "tomcat: Remote Code Execution via JSP Upload", "title": "Vulnerability summary" }, { "category": "other", "text": "This flaw affects Tomcat on Red Hat Enterprise Linux only when a specific context is configured with readonly=false. The default configuration has a readonly context, so it is not affected.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Server-JWS-3.1:mod_cluster-0:1.3.8-2.Final_redhat_2.1.ep7.el6.noarch", "6Server-JWS-3.1:mod_cluster-0:1.3.8-2.Final_redhat_2.1.ep7.el6.src", "6Server-JWS-3.1:mod_cluster-tomcat7-0:1.3.8-2.Final_redhat_2.1.ep7.el6.noarch", "6Server-JWS-3.1:mod_cluster-tomcat8-0:1.3.8-2.Final_redhat_2.1.ep7.el6.noarch", "6Server-JWS-3.1:tomcat-native-0:1.2.8-11.redhat_11.ep7.el6.i686", "6Server-JWS-3.1:tomcat-native-0:1.2.8-11.redhat_11.ep7.el6.src", "6Server-JWS-3.1:tomcat-native-0:1.2.8-11.redhat_11.ep7.el6.x86_64", "6Server-JWS-3.1:tomcat-native-debuginfo-0:1.2.8-11.redhat_11.ep7.el6.i686", "6Server-JWS-3.1:tomcat-native-debuginfo-0:1.2.8-11.redhat_11.ep7.el6.x86_64", "6Server-JWS-3.1:tomcat-vault-0:1.1.6-1.Final_redhat_1.1.ep7.el6.noarch", "6Server-JWS-3.1:tomcat-vault-0:1.1.6-1.Final_redhat_1.1.ep7.el6.src", "6Server-JWS-3.1:tomcat-vault-tomcat7-0:1.1.6-1.Final_redhat_1.1.ep7.el6.noarch", "6Server-JWS-3.1:tomcat-vault-tomcat8-0:1.1.6-1.Final_redhat_1.1.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-0:7.0.70-25.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-0:7.0.70-25.ep7.el6.src", "6Server-JWS-3.1:tomcat7-admin-webapps-0:7.0.70-25.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-docs-webapp-0:7.0.70-25.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-el-2.2-api-0:7.0.70-25.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-javadoc-0:7.0.70-25.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-jsp-2.2-api-0:7.0.70-25.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-jsvc-0:7.0.70-25.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-lib-0:7.0.70-25.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-log4j-0:7.0.70-25.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-selinux-0:7.0.70-25.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-servlet-3.0-api-0:7.0.70-25.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-webapps-0:7.0.70-25.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-0:8.0.36-29.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-0:8.0.36-29.ep7.el6.src", "6Server-JWS-3.1:tomcat8-admin-webapps-0:8.0.36-29.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-docs-webapp-0:8.0.36-29.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-el-2.2-api-0:8.0.36-29.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-javadoc-0:8.0.36-29.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-jsp-2.3-api-0:8.0.36-29.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-jsvc-0:8.0.36-29.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-lib-0:8.0.36-29.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-log4j-0:8.0.36-29.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-selinux-0:8.0.36-29.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-servlet-3.1-api-0:8.0.36-29.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-webapps-0:8.0.36-29.ep7.el6.noarch", "7Server-JWS-3.1:mod_cluster-0:1.3.8-2.Final_redhat_2.1.ep7.el7.noarch", "7Server-JWS-3.1:mod_cluster-0:1.3.8-2.Final_redhat_2.1.ep7.el7.src", "7Server-JWS-3.1:mod_cluster-tomcat7-0:1.3.8-2.Final_redhat_2.1.ep7.el7.noarch", "7Server-JWS-3.1:mod_cluster-tomcat8-0:1.3.8-2.Final_redhat_2.1.ep7.el7.noarch", "7Server-JWS-3.1:tomcat-native-0:1.2.8-11.redhat_11.ep7.el7.src", "7Server-JWS-3.1:tomcat-native-0:1.2.8-11.redhat_11.ep7.el7.x86_64", "7Server-JWS-3.1:tomcat-native-debuginfo-0:1.2.8-11.redhat_11.ep7.el7.x86_64", "7Server-JWS-3.1:tomcat-vault-0:1.1.6-1.Final_redhat_1.1.ep7.el7.noarch", "7Server-JWS-3.1:tomcat-vault-0:1.1.6-1.Final_redhat_1.1.ep7.el7.src", "7Server-JWS-3.1:tomcat-vault-tomcat7-0:1.1.6-1.Final_redhat_1.1.ep7.el7.noarch", "7Server-JWS-3.1:tomcat-vault-tomcat8-0:1.1.6-1.Final_redhat_1.1.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-0:7.0.70-25.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-0:7.0.70-25.ep7.el7.src", "7Server-JWS-3.1:tomcat7-admin-webapps-0:7.0.70-25.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-docs-webapp-0:7.0.70-25.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-el-2.2-api-0:7.0.70-25.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-javadoc-0:7.0.70-25.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-jsp-2.2-api-0:7.0.70-25.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-jsvc-0:7.0.70-25.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-lib-0:7.0.70-25.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-log4j-0:7.0.70-25.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-selinux-0:7.0.70-25.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-servlet-3.0-api-0:7.0.70-25.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-webapps-0:7.0.70-25.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-0:8.0.36-29.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-0:8.0.36-29.ep7.el7.src", "7Server-JWS-3.1:tomcat8-admin-webapps-0:8.0.36-29.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-docs-webapp-0:8.0.36-29.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-el-2.2-api-0:8.0.36-29.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-javadoc-0:8.0.36-29.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-jsp-2.3-api-0:8.0.36-29.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-jsvc-0:8.0.36-29.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-lib-0:8.0.36-29.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-log4j-0:8.0.36-29.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-selinux-0:8.0.36-29.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-servlet-3.1-api-0:8.0.36-29.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-webapps-0:8.0.36-29.ep7.el7.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2017-12615" }, { "category": "external", "summary": "RHBZ#1493220", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1493220" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2017-12615", "url": "https://www.cve.org/CVERecord?id=CVE-2017-12615" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-12615", "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-12615" }, { "category": "external", "summary": "https://tomcat.apache.org/security-7.html#Fixed_in_Apache_Tomcat_7.0.81", "url": "https://tomcat.apache.org/security-7.html#Fixed_in_Apache_Tomcat_7.0.81" }, { "category": "external", "summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog", "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog" } ], "release_date": "2017-09-19T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-03-07T15:21:52+00:00", "details": "Before applying the update, back up your existing Red Hat JBoss Web Server installation (including all applications and configuration files).\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "6Server-JWS-3.1:mod_cluster-0:1.3.8-2.Final_redhat_2.1.ep7.el6.noarch", "6Server-JWS-3.1:mod_cluster-0:1.3.8-2.Final_redhat_2.1.ep7.el6.src", "6Server-JWS-3.1:mod_cluster-tomcat7-0:1.3.8-2.Final_redhat_2.1.ep7.el6.noarch", "6Server-JWS-3.1:mod_cluster-tomcat8-0:1.3.8-2.Final_redhat_2.1.ep7.el6.noarch", "6Server-JWS-3.1:tomcat-native-0:1.2.8-11.redhat_11.ep7.el6.i686", "6Server-JWS-3.1:tomcat-native-0:1.2.8-11.redhat_11.ep7.el6.src", "6Server-JWS-3.1:tomcat-native-0:1.2.8-11.redhat_11.ep7.el6.x86_64", "6Server-JWS-3.1:tomcat-native-debuginfo-0:1.2.8-11.redhat_11.ep7.el6.i686", "6Server-JWS-3.1:tomcat-native-debuginfo-0:1.2.8-11.redhat_11.ep7.el6.x86_64", "6Server-JWS-3.1:tomcat-vault-0:1.1.6-1.Final_redhat_1.1.ep7.el6.noarch", "6Server-JWS-3.1:tomcat-vault-0:1.1.6-1.Final_redhat_1.1.ep7.el6.src", "6Server-JWS-3.1:tomcat-vault-tomcat7-0:1.1.6-1.Final_redhat_1.1.ep7.el6.noarch", "6Server-JWS-3.1:tomcat-vault-tomcat8-0:1.1.6-1.Final_redhat_1.1.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-0:7.0.70-25.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-0:7.0.70-25.ep7.el6.src", "6Server-JWS-3.1:tomcat7-admin-webapps-0:7.0.70-25.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-docs-webapp-0:7.0.70-25.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-el-2.2-api-0:7.0.70-25.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-javadoc-0:7.0.70-25.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-jsp-2.2-api-0:7.0.70-25.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-jsvc-0:7.0.70-25.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-lib-0:7.0.70-25.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-log4j-0:7.0.70-25.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-selinux-0:7.0.70-25.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-servlet-3.0-api-0:7.0.70-25.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-webapps-0:7.0.70-25.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-0:8.0.36-29.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-0:8.0.36-29.ep7.el6.src", "6Server-JWS-3.1:tomcat8-admin-webapps-0:8.0.36-29.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-docs-webapp-0:8.0.36-29.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-el-2.2-api-0:8.0.36-29.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-javadoc-0:8.0.36-29.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-jsp-2.3-api-0:8.0.36-29.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-jsvc-0:8.0.36-29.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-lib-0:8.0.36-29.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-log4j-0:8.0.36-29.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-selinux-0:8.0.36-29.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-servlet-3.1-api-0:8.0.36-29.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-webapps-0:8.0.36-29.ep7.el6.noarch", "7Server-JWS-3.1:mod_cluster-0:1.3.8-2.Final_redhat_2.1.ep7.el7.noarch", "7Server-JWS-3.1:mod_cluster-0:1.3.8-2.Final_redhat_2.1.ep7.el7.src", "7Server-JWS-3.1:mod_cluster-tomcat7-0:1.3.8-2.Final_redhat_2.1.ep7.el7.noarch", "7Server-JWS-3.1:mod_cluster-tomcat8-0:1.3.8-2.Final_redhat_2.1.ep7.el7.noarch", "7Server-JWS-3.1:tomcat-native-0:1.2.8-11.redhat_11.ep7.el7.src", "7Server-JWS-3.1:tomcat-native-0:1.2.8-11.redhat_11.ep7.el7.x86_64", "7Server-JWS-3.1:tomcat-native-debuginfo-0:1.2.8-11.redhat_11.ep7.el7.x86_64", "7Server-JWS-3.1:tomcat-vault-0:1.1.6-1.Final_redhat_1.1.ep7.el7.noarch", "7Server-JWS-3.1:tomcat-vault-0:1.1.6-1.Final_redhat_1.1.ep7.el7.src", "7Server-JWS-3.1:tomcat-vault-tomcat7-0:1.1.6-1.Final_redhat_1.1.ep7.el7.noarch", "7Server-JWS-3.1:tomcat-vault-tomcat8-0:1.1.6-1.Final_redhat_1.1.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-0:7.0.70-25.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-0:7.0.70-25.ep7.el7.src", "7Server-JWS-3.1:tomcat7-admin-webapps-0:7.0.70-25.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-docs-webapp-0:7.0.70-25.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-el-2.2-api-0:7.0.70-25.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-javadoc-0:7.0.70-25.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-jsp-2.2-api-0:7.0.70-25.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-jsvc-0:7.0.70-25.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-lib-0:7.0.70-25.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-log4j-0:7.0.70-25.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-selinux-0:7.0.70-25.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-servlet-3.0-api-0:7.0.70-25.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-webapps-0:7.0.70-25.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-0:8.0.36-29.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-0:8.0.36-29.ep7.el7.src", "7Server-JWS-3.1:tomcat8-admin-webapps-0:8.0.36-29.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-docs-webapp-0:8.0.36-29.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-el-2.2-api-0:8.0.36-29.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-javadoc-0:8.0.36-29.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-jsp-2.3-api-0:8.0.36-29.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-jsvc-0:8.0.36-29.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-lib-0:8.0.36-29.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-log4j-0:8.0.36-29.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-selinux-0:8.0.36-29.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-servlet-3.1-api-0:8.0.36-29.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-webapps-0:8.0.36-29.ep7.el7.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2018:0466" }, { "category": "workaround", "details": "Ensure that readonly is set to true (the default) for the DefaultServlet, WebDAV servlet or application context.\n\nBlock HTTP methods that permit resource modification for untrusted users.", "product_ids": [ "6Server-JWS-3.1:mod_cluster-0:1.3.8-2.Final_redhat_2.1.ep7.el6.noarch", "6Server-JWS-3.1:mod_cluster-0:1.3.8-2.Final_redhat_2.1.ep7.el6.src", "6Server-JWS-3.1:mod_cluster-tomcat7-0:1.3.8-2.Final_redhat_2.1.ep7.el6.noarch", "6Server-JWS-3.1:mod_cluster-tomcat8-0:1.3.8-2.Final_redhat_2.1.ep7.el6.noarch", "6Server-JWS-3.1:tomcat-native-0:1.2.8-11.redhat_11.ep7.el6.i686", "6Server-JWS-3.1:tomcat-native-0:1.2.8-11.redhat_11.ep7.el6.src", "6Server-JWS-3.1:tomcat-native-0:1.2.8-11.redhat_11.ep7.el6.x86_64", "6Server-JWS-3.1:tomcat-native-debuginfo-0:1.2.8-11.redhat_11.ep7.el6.i686", "6Server-JWS-3.1:tomcat-native-debuginfo-0:1.2.8-11.redhat_11.ep7.el6.x86_64", "6Server-JWS-3.1:tomcat-vault-0:1.1.6-1.Final_redhat_1.1.ep7.el6.noarch", "6Server-JWS-3.1:tomcat-vault-0:1.1.6-1.Final_redhat_1.1.ep7.el6.src", "6Server-JWS-3.1:tomcat-vault-tomcat7-0:1.1.6-1.Final_redhat_1.1.ep7.el6.noarch", "6Server-JWS-3.1:tomcat-vault-tomcat8-0:1.1.6-1.Final_redhat_1.1.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-0:7.0.70-25.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-0:7.0.70-25.ep7.el6.src", "6Server-JWS-3.1:tomcat7-admin-webapps-0:7.0.70-25.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-docs-webapp-0:7.0.70-25.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-el-2.2-api-0:7.0.70-25.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-javadoc-0:7.0.70-25.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-jsp-2.2-api-0:7.0.70-25.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-jsvc-0:7.0.70-25.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-lib-0:7.0.70-25.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-log4j-0:7.0.70-25.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-selinux-0:7.0.70-25.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-servlet-3.0-api-0:7.0.70-25.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-webapps-0:7.0.70-25.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-0:8.0.36-29.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-0:8.0.36-29.ep7.el6.src", "6Server-JWS-3.1:tomcat8-admin-webapps-0:8.0.36-29.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-docs-webapp-0:8.0.36-29.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-el-2.2-api-0:8.0.36-29.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-javadoc-0:8.0.36-29.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-jsp-2.3-api-0:8.0.36-29.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-jsvc-0:8.0.36-29.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-lib-0:8.0.36-29.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-log4j-0:8.0.36-29.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-selinux-0:8.0.36-29.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-servlet-3.1-api-0:8.0.36-29.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-webapps-0:8.0.36-29.ep7.el6.noarch", "7Server-JWS-3.1:mod_cluster-0:1.3.8-2.Final_redhat_2.1.ep7.el7.noarch", "7Server-JWS-3.1:mod_cluster-0:1.3.8-2.Final_redhat_2.1.ep7.el7.src", "7Server-JWS-3.1:mod_cluster-tomcat7-0:1.3.8-2.Final_redhat_2.1.ep7.el7.noarch", "7Server-JWS-3.1:mod_cluster-tomcat8-0:1.3.8-2.Final_redhat_2.1.ep7.el7.noarch", "7Server-JWS-3.1:tomcat-native-0:1.2.8-11.redhat_11.ep7.el7.src", "7Server-JWS-3.1:tomcat-native-0:1.2.8-11.redhat_11.ep7.el7.x86_64", "7Server-JWS-3.1:tomcat-native-debuginfo-0:1.2.8-11.redhat_11.ep7.el7.x86_64", "7Server-JWS-3.1:tomcat-vault-0:1.1.6-1.Final_redhat_1.1.ep7.el7.noarch", "7Server-JWS-3.1:tomcat-vault-0:1.1.6-1.Final_redhat_1.1.ep7.el7.src", "7Server-JWS-3.1:tomcat-vault-tomcat7-0:1.1.6-1.Final_redhat_1.1.ep7.el7.noarch", "7Server-JWS-3.1:tomcat-vault-tomcat8-0:1.1.6-1.Final_redhat_1.1.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-0:7.0.70-25.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-0:7.0.70-25.ep7.el7.src", "7Server-JWS-3.1:tomcat7-admin-webapps-0:7.0.70-25.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-docs-webapp-0:7.0.70-25.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-el-2.2-api-0:7.0.70-25.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-javadoc-0:7.0.70-25.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-jsp-2.2-api-0:7.0.70-25.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-jsvc-0:7.0.70-25.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-lib-0:7.0.70-25.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-log4j-0:7.0.70-25.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-selinux-0:7.0.70-25.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-servlet-3.0-api-0:7.0.70-25.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-webapps-0:7.0.70-25.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-0:8.0.36-29.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-0:8.0.36-29.ep7.el7.src", "7Server-JWS-3.1:tomcat8-admin-webapps-0:8.0.36-29.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-docs-webapp-0:8.0.36-29.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-el-2.2-api-0:8.0.36-29.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-javadoc-0:8.0.36-29.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-jsp-2.3-api-0:8.0.36-29.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-jsvc-0:8.0.36-29.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-lib-0:8.0.36-29.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-log4j-0:8.0.36-29.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-selinux-0:8.0.36-29.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-servlet-3.1-api-0:8.0.36-29.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-webapps-0:8.0.36-29.ep7.el7.noarch" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "6Server-JWS-3.1:mod_cluster-0:1.3.8-2.Final_redhat_2.1.ep7.el6.noarch", "6Server-JWS-3.1:mod_cluster-0:1.3.8-2.Final_redhat_2.1.ep7.el6.src", "6Server-JWS-3.1:mod_cluster-tomcat7-0:1.3.8-2.Final_redhat_2.1.ep7.el6.noarch", "6Server-JWS-3.1:mod_cluster-tomcat8-0:1.3.8-2.Final_redhat_2.1.ep7.el6.noarch", "6Server-JWS-3.1:tomcat-native-0:1.2.8-11.redhat_11.ep7.el6.i686", "6Server-JWS-3.1:tomcat-native-0:1.2.8-11.redhat_11.ep7.el6.src", "6Server-JWS-3.1:tomcat-native-0:1.2.8-11.redhat_11.ep7.el6.x86_64", "6Server-JWS-3.1:tomcat-native-debuginfo-0:1.2.8-11.redhat_11.ep7.el6.i686", "6Server-JWS-3.1:tomcat-native-debuginfo-0:1.2.8-11.redhat_11.ep7.el6.x86_64", "6Server-JWS-3.1:tomcat-vault-0:1.1.6-1.Final_redhat_1.1.ep7.el6.noarch", "6Server-JWS-3.1:tomcat-vault-0:1.1.6-1.Final_redhat_1.1.ep7.el6.src", "6Server-JWS-3.1:tomcat-vault-tomcat7-0:1.1.6-1.Final_redhat_1.1.ep7.el6.noarch", "6Server-JWS-3.1:tomcat-vault-tomcat8-0:1.1.6-1.Final_redhat_1.1.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-0:7.0.70-25.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-0:7.0.70-25.ep7.el6.src", "6Server-JWS-3.1:tomcat7-admin-webapps-0:7.0.70-25.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-docs-webapp-0:7.0.70-25.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-el-2.2-api-0:7.0.70-25.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-javadoc-0:7.0.70-25.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-jsp-2.2-api-0:7.0.70-25.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-jsvc-0:7.0.70-25.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-lib-0:7.0.70-25.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-log4j-0:7.0.70-25.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-selinux-0:7.0.70-25.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-servlet-3.0-api-0:7.0.70-25.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-webapps-0:7.0.70-25.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-0:8.0.36-29.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-0:8.0.36-29.ep7.el6.src", "6Server-JWS-3.1:tomcat8-admin-webapps-0:8.0.36-29.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-docs-webapp-0:8.0.36-29.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-el-2.2-api-0:8.0.36-29.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-javadoc-0:8.0.36-29.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-jsp-2.3-api-0:8.0.36-29.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-jsvc-0:8.0.36-29.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-lib-0:8.0.36-29.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-log4j-0:8.0.36-29.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-selinux-0:8.0.36-29.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-servlet-3.1-api-0:8.0.36-29.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-webapps-0:8.0.36-29.ep7.el6.noarch", "7Server-JWS-3.1:mod_cluster-0:1.3.8-2.Final_redhat_2.1.ep7.el7.noarch", "7Server-JWS-3.1:mod_cluster-0:1.3.8-2.Final_redhat_2.1.ep7.el7.src", "7Server-JWS-3.1:mod_cluster-tomcat7-0:1.3.8-2.Final_redhat_2.1.ep7.el7.noarch", "7Server-JWS-3.1:mod_cluster-tomcat8-0:1.3.8-2.Final_redhat_2.1.ep7.el7.noarch", "7Server-JWS-3.1:tomcat-native-0:1.2.8-11.redhat_11.ep7.el7.src", "7Server-JWS-3.1:tomcat-native-0:1.2.8-11.redhat_11.ep7.el7.x86_64", "7Server-JWS-3.1:tomcat-native-debuginfo-0:1.2.8-11.redhat_11.ep7.el7.x86_64", "7Server-JWS-3.1:tomcat-vault-0:1.1.6-1.Final_redhat_1.1.ep7.el7.noarch", "7Server-JWS-3.1:tomcat-vault-0:1.1.6-1.Final_redhat_1.1.ep7.el7.src", "7Server-JWS-3.1:tomcat-vault-tomcat7-0:1.1.6-1.Final_redhat_1.1.ep7.el7.noarch", "7Server-JWS-3.1:tomcat-vault-tomcat8-0:1.1.6-1.Final_redhat_1.1.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-0:7.0.70-25.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-0:7.0.70-25.ep7.el7.src", "7Server-JWS-3.1:tomcat7-admin-webapps-0:7.0.70-25.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-docs-webapp-0:7.0.70-25.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-el-2.2-api-0:7.0.70-25.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-javadoc-0:7.0.70-25.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-jsp-2.2-api-0:7.0.70-25.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-jsvc-0:7.0.70-25.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-lib-0:7.0.70-25.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-log4j-0:7.0.70-25.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-selinux-0:7.0.70-25.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-servlet-3.0-api-0:7.0.70-25.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-webapps-0:7.0.70-25.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-0:8.0.36-29.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-0:8.0.36-29.ep7.el7.src", "7Server-JWS-3.1:tomcat8-admin-webapps-0:8.0.36-29.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-docs-webapp-0:8.0.36-29.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-el-2.2-api-0:8.0.36-29.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-javadoc-0:8.0.36-29.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-jsp-2.3-api-0:8.0.36-29.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-jsvc-0:8.0.36-29.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-lib-0:8.0.36-29.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-log4j-0:8.0.36-29.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-selinux-0:8.0.36-29.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-servlet-3.1-api-0:8.0.36-29.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-webapps-0:8.0.36-29.ep7.el7.noarch" ] } ], "threats": [ { "category": "exploit_status", "date": "2022-03-25T00:00:00+00:00", "details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog" }, { "category": "impact", "details": "Important" } ], "title": "tomcat: Remote Code Execution via JSP Upload" }, { "cve": "CVE-2017-12616", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2017-09-19T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1493222" } ], "notes": [ { "category": "description", "text": "When using a VirtualDirContext with Apache Tomcat 7.0.0 to 7.0.80 it was possible to bypass security constraints and/or view the source code of JSPs for resources served by the VirtualDirContext using a specially crafted request.", "title": "Vulnerability description" }, { "category": "summary", "text": "tomcat: Information Disclosure when using VirtualDirContext", "title": "Vulnerability summary" }, { "category": "other", "text": "VirtualDirContext is not designed to be used in production, but only to ease development with IDEs without needing to fully republish jars in WEB-INF/lib.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Server-JWS-3.1:mod_cluster-0:1.3.8-2.Final_redhat_2.1.ep7.el6.noarch", "6Server-JWS-3.1:mod_cluster-0:1.3.8-2.Final_redhat_2.1.ep7.el6.src", "6Server-JWS-3.1:mod_cluster-tomcat7-0:1.3.8-2.Final_redhat_2.1.ep7.el6.noarch", "6Server-JWS-3.1:mod_cluster-tomcat8-0:1.3.8-2.Final_redhat_2.1.ep7.el6.noarch", "6Server-JWS-3.1:tomcat-native-0:1.2.8-11.redhat_11.ep7.el6.i686", "6Server-JWS-3.1:tomcat-native-0:1.2.8-11.redhat_11.ep7.el6.src", "6Server-JWS-3.1:tomcat-native-0:1.2.8-11.redhat_11.ep7.el6.x86_64", "6Server-JWS-3.1:tomcat-native-debuginfo-0:1.2.8-11.redhat_11.ep7.el6.i686", "6Server-JWS-3.1:tomcat-native-debuginfo-0:1.2.8-11.redhat_11.ep7.el6.x86_64", "6Server-JWS-3.1:tomcat-vault-0:1.1.6-1.Final_redhat_1.1.ep7.el6.noarch", "6Server-JWS-3.1:tomcat-vault-0:1.1.6-1.Final_redhat_1.1.ep7.el6.src", "6Server-JWS-3.1:tomcat-vault-tomcat7-0:1.1.6-1.Final_redhat_1.1.ep7.el6.noarch", "6Server-JWS-3.1:tomcat-vault-tomcat8-0:1.1.6-1.Final_redhat_1.1.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-0:7.0.70-25.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-0:7.0.70-25.ep7.el6.src", "6Server-JWS-3.1:tomcat7-admin-webapps-0:7.0.70-25.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-docs-webapp-0:7.0.70-25.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-el-2.2-api-0:7.0.70-25.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-javadoc-0:7.0.70-25.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-jsp-2.2-api-0:7.0.70-25.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-jsvc-0:7.0.70-25.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-lib-0:7.0.70-25.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-log4j-0:7.0.70-25.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-selinux-0:7.0.70-25.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-servlet-3.0-api-0:7.0.70-25.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-webapps-0:7.0.70-25.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-0:8.0.36-29.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-0:8.0.36-29.ep7.el6.src", "6Server-JWS-3.1:tomcat8-admin-webapps-0:8.0.36-29.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-docs-webapp-0:8.0.36-29.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-el-2.2-api-0:8.0.36-29.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-javadoc-0:8.0.36-29.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-jsp-2.3-api-0:8.0.36-29.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-jsvc-0:8.0.36-29.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-lib-0:8.0.36-29.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-log4j-0:8.0.36-29.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-selinux-0:8.0.36-29.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-servlet-3.1-api-0:8.0.36-29.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-webapps-0:8.0.36-29.ep7.el6.noarch", "7Server-JWS-3.1:mod_cluster-0:1.3.8-2.Final_redhat_2.1.ep7.el7.noarch", "7Server-JWS-3.1:mod_cluster-0:1.3.8-2.Final_redhat_2.1.ep7.el7.src", "7Server-JWS-3.1:mod_cluster-tomcat7-0:1.3.8-2.Final_redhat_2.1.ep7.el7.noarch", "7Server-JWS-3.1:mod_cluster-tomcat8-0:1.3.8-2.Final_redhat_2.1.ep7.el7.noarch", "7Server-JWS-3.1:tomcat-native-0:1.2.8-11.redhat_11.ep7.el7.src", "7Server-JWS-3.1:tomcat-native-0:1.2.8-11.redhat_11.ep7.el7.x86_64", "7Server-JWS-3.1:tomcat-native-debuginfo-0:1.2.8-11.redhat_11.ep7.el7.x86_64", "7Server-JWS-3.1:tomcat-vault-0:1.1.6-1.Final_redhat_1.1.ep7.el7.noarch", "7Server-JWS-3.1:tomcat-vault-0:1.1.6-1.Final_redhat_1.1.ep7.el7.src", "7Server-JWS-3.1:tomcat-vault-tomcat7-0:1.1.6-1.Final_redhat_1.1.ep7.el7.noarch", "7Server-JWS-3.1:tomcat-vault-tomcat8-0:1.1.6-1.Final_redhat_1.1.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-0:7.0.70-25.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-0:7.0.70-25.ep7.el7.src", "7Server-JWS-3.1:tomcat7-admin-webapps-0:7.0.70-25.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-docs-webapp-0:7.0.70-25.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-el-2.2-api-0:7.0.70-25.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-javadoc-0:7.0.70-25.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-jsp-2.2-api-0:7.0.70-25.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-jsvc-0:7.0.70-25.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-lib-0:7.0.70-25.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-log4j-0:7.0.70-25.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-selinux-0:7.0.70-25.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-servlet-3.0-api-0:7.0.70-25.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-webapps-0:7.0.70-25.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-0:8.0.36-29.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-0:8.0.36-29.ep7.el7.src", "7Server-JWS-3.1:tomcat8-admin-webapps-0:8.0.36-29.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-docs-webapp-0:8.0.36-29.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-el-2.2-api-0:8.0.36-29.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-javadoc-0:8.0.36-29.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-jsp-2.3-api-0:8.0.36-29.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-jsvc-0:8.0.36-29.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-lib-0:8.0.36-29.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-log4j-0:8.0.36-29.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-selinux-0:8.0.36-29.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-servlet-3.1-api-0:8.0.36-29.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-webapps-0:8.0.36-29.ep7.el7.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2017-12616" }, { "category": "external", "summary": "RHBZ#1493222", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1493222" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2017-12616", "url": "https://www.cve.org/CVERecord?id=CVE-2017-12616" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-12616", "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-12616" }, { "category": "external", "summary": "https://tomcat.apache.org/security-7.html#Fixed_in_Apache_Tomcat_7.0.81", "url": "https://tomcat.apache.org/security-7.html#Fixed_in_Apache_Tomcat_7.0.81" } ], "release_date": "2017-09-19T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-03-07T15:21:52+00:00", "details": "Before applying the update, back up your existing Red Hat JBoss Web Server installation (including all applications and configuration files).\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "6Server-JWS-3.1:mod_cluster-0:1.3.8-2.Final_redhat_2.1.ep7.el6.noarch", "6Server-JWS-3.1:mod_cluster-0:1.3.8-2.Final_redhat_2.1.ep7.el6.src", "6Server-JWS-3.1:mod_cluster-tomcat7-0:1.3.8-2.Final_redhat_2.1.ep7.el6.noarch", "6Server-JWS-3.1:mod_cluster-tomcat8-0:1.3.8-2.Final_redhat_2.1.ep7.el6.noarch", "6Server-JWS-3.1:tomcat-native-0:1.2.8-11.redhat_11.ep7.el6.i686", "6Server-JWS-3.1:tomcat-native-0:1.2.8-11.redhat_11.ep7.el6.src", "6Server-JWS-3.1:tomcat-native-0:1.2.8-11.redhat_11.ep7.el6.x86_64", "6Server-JWS-3.1:tomcat-native-debuginfo-0:1.2.8-11.redhat_11.ep7.el6.i686", "6Server-JWS-3.1:tomcat-native-debuginfo-0:1.2.8-11.redhat_11.ep7.el6.x86_64", "6Server-JWS-3.1:tomcat-vault-0:1.1.6-1.Final_redhat_1.1.ep7.el6.noarch", "6Server-JWS-3.1:tomcat-vault-0:1.1.6-1.Final_redhat_1.1.ep7.el6.src", "6Server-JWS-3.1:tomcat-vault-tomcat7-0:1.1.6-1.Final_redhat_1.1.ep7.el6.noarch", "6Server-JWS-3.1:tomcat-vault-tomcat8-0:1.1.6-1.Final_redhat_1.1.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-0:7.0.70-25.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-0:7.0.70-25.ep7.el6.src", "6Server-JWS-3.1:tomcat7-admin-webapps-0:7.0.70-25.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-docs-webapp-0:7.0.70-25.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-el-2.2-api-0:7.0.70-25.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-javadoc-0:7.0.70-25.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-jsp-2.2-api-0:7.0.70-25.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-jsvc-0:7.0.70-25.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-lib-0:7.0.70-25.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-log4j-0:7.0.70-25.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-selinux-0:7.0.70-25.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-servlet-3.0-api-0:7.0.70-25.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-webapps-0:7.0.70-25.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-0:8.0.36-29.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-0:8.0.36-29.ep7.el6.src", "6Server-JWS-3.1:tomcat8-admin-webapps-0:8.0.36-29.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-docs-webapp-0:8.0.36-29.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-el-2.2-api-0:8.0.36-29.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-javadoc-0:8.0.36-29.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-jsp-2.3-api-0:8.0.36-29.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-jsvc-0:8.0.36-29.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-lib-0:8.0.36-29.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-log4j-0:8.0.36-29.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-selinux-0:8.0.36-29.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-servlet-3.1-api-0:8.0.36-29.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-webapps-0:8.0.36-29.ep7.el6.noarch", "7Server-JWS-3.1:mod_cluster-0:1.3.8-2.Final_redhat_2.1.ep7.el7.noarch", "7Server-JWS-3.1:mod_cluster-0:1.3.8-2.Final_redhat_2.1.ep7.el7.src", "7Server-JWS-3.1:mod_cluster-tomcat7-0:1.3.8-2.Final_redhat_2.1.ep7.el7.noarch", "7Server-JWS-3.1:mod_cluster-tomcat8-0:1.3.8-2.Final_redhat_2.1.ep7.el7.noarch", "7Server-JWS-3.1:tomcat-native-0:1.2.8-11.redhat_11.ep7.el7.src", "7Server-JWS-3.1:tomcat-native-0:1.2.8-11.redhat_11.ep7.el7.x86_64", "7Server-JWS-3.1:tomcat-native-debuginfo-0:1.2.8-11.redhat_11.ep7.el7.x86_64", "7Server-JWS-3.1:tomcat-vault-0:1.1.6-1.Final_redhat_1.1.ep7.el7.noarch", "7Server-JWS-3.1:tomcat-vault-0:1.1.6-1.Final_redhat_1.1.ep7.el7.src", "7Server-JWS-3.1:tomcat-vault-tomcat7-0:1.1.6-1.Final_redhat_1.1.ep7.el7.noarch", "7Server-JWS-3.1:tomcat-vault-tomcat8-0:1.1.6-1.Final_redhat_1.1.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-0:7.0.70-25.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-0:7.0.70-25.ep7.el7.src", "7Server-JWS-3.1:tomcat7-admin-webapps-0:7.0.70-25.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-docs-webapp-0:7.0.70-25.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-el-2.2-api-0:7.0.70-25.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-javadoc-0:7.0.70-25.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-jsp-2.2-api-0:7.0.70-25.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-jsvc-0:7.0.70-25.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-lib-0:7.0.70-25.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-log4j-0:7.0.70-25.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-selinux-0:7.0.70-25.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-servlet-3.0-api-0:7.0.70-25.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-webapps-0:7.0.70-25.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-0:8.0.36-29.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-0:8.0.36-29.ep7.el7.src", "7Server-JWS-3.1:tomcat8-admin-webapps-0:8.0.36-29.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-docs-webapp-0:8.0.36-29.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-el-2.2-api-0:8.0.36-29.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-javadoc-0:8.0.36-29.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-jsp-2.3-api-0:8.0.36-29.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-jsvc-0:8.0.36-29.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-lib-0:8.0.36-29.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-log4j-0:8.0.36-29.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-selinux-0:8.0.36-29.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-servlet-3.1-api-0:8.0.36-29.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-webapps-0:8.0.36-29.ep7.el7.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2018:0466" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.0" }, "products": [ "6Server-JWS-3.1:mod_cluster-0:1.3.8-2.Final_redhat_2.1.ep7.el6.noarch", "6Server-JWS-3.1:mod_cluster-0:1.3.8-2.Final_redhat_2.1.ep7.el6.src", "6Server-JWS-3.1:mod_cluster-tomcat7-0:1.3.8-2.Final_redhat_2.1.ep7.el6.noarch", "6Server-JWS-3.1:mod_cluster-tomcat8-0:1.3.8-2.Final_redhat_2.1.ep7.el6.noarch", "6Server-JWS-3.1:tomcat-native-0:1.2.8-11.redhat_11.ep7.el6.i686", "6Server-JWS-3.1:tomcat-native-0:1.2.8-11.redhat_11.ep7.el6.src", "6Server-JWS-3.1:tomcat-native-0:1.2.8-11.redhat_11.ep7.el6.x86_64", "6Server-JWS-3.1:tomcat-native-debuginfo-0:1.2.8-11.redhat_11.ep7.el6.i686", "6Server-JWS-3.1:tomcat-native-debuginfo-0:1.2.8-11.redhat_11.ep7.el6.x86_64", "6Server-JWS-3.1:tomcat-vault-0:1.1.6-1.Final_redhat_1.1.ep7.el6.noarch", "6Server-JWS-3.1:tomcat-vault-0:1.1.6-1.Final_redhat_1.1.ep7.el6.src", "6Server-JWS-3.1:tomcat-vault-tomcat7-0:1.1.6-1.Final_redhat_1.1.ep7.el6.noarch", "6Server-JWS-3.1:tomcat-vault-tomcat8-0:1.1.6-1.Final_redhat_1.1.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-0:7.0.70-25.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-0:7.0.70-25.ep7.el6.src", "6Server-JWS-3.1:tomcat7-admin-webapps-0:7.0.70-25.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-docs-webapp-0:7.0.70-25.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-el-2.2-api-0:7.0.70-25.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-javadoc-0:7.0.70-25.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-jsp-2.2-api-0:7.0.70-25.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-jsvc-0:7.0.70-25.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-lib-0:7.0.70-25.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-log4j-0:7.0.70-25.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-selinux-0:7.0.70-25.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-servlet-3.0-api-0:7.0.70-25.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-webapps-0:7.0.70-25.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-0:8.0.36-29.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-0:8.0.36-29.ep7.el6.src", "6Server-JWS-3.1:tomcat8-admin-webapps-0:8.0.36-29.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-docs-webapp-0:8.0.36-29.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-el-2.2-api-0:8.0.36-29.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-javadoc-0:8.0.36-29.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-jsp-2.3-api-0:8.0.36-29.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-jsvc-0:8.0.36-29.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-lib-0:8.0.36-29.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-log4j-0:8.0.36-29.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-selinux-0:8.0.36-29.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-servlet-3.1-api-0:8.0.36-29.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-webapps-0:8.0.36-29.ep7.el6.noarch", "7Server-JWS-3.1:mod_cluster-0:1.3.8-2.Final_redhat_2.1.ep7.el7.noarch", "7Server-JWS-3.1:mod_cluster-0:1.3.8-2.Final_redhat_2.1.ep7.el7.src", "7Server-JWS-3.1:mod_cluster-tomcat7-0:1.3.8-2.Final_redhat_2.1.ep7.el7.noarch", "7Server-JWS-3.1:mod_cluster-tomcat8-0:1.3.8-2.Final_redhat_2.1.ep7.el7.noarch", "7Server-JWS-3.1:tomcat-native-0:1.2.8-11.redhat_11.ep7.el7.src", "7Server-JWS-3.1:tomcat-native-0:1.2.8-11.redhat_11.ep7.el7.x86_64", "7Server-JWS-3.1:tomcat-native-debuginfo-0:1.2.8-11.redhat_11.ep7.el7.x86_64", "7Server-JWS-3.1:tomcat-vault-0:1.1.6-1.Final_redhat_1.1.ep7.el7.noarch", "7Server-JWS-3.1:tomcat-vault-0:1.1.6-1.Final_redhat_1.1.ep7.el7.src", "7Server-JWS-3.1:tomcat-vault-tomcat7-0:1.1.6-1.Final_redhat_1.1.ep7.el7.noarch", "7Server-JWS-3.1:tomcat-vault-tomcat8-0:1.1.6-1.Final_redhat_1.1.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-0:7.0.70-25.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-0:7.0.70-25.ep7.el7.src", "7Server-JWS-3.1:tomcat7-admin-webapps-0:7.0.70-25.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-docs-webapp-0:7.0.70-25.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-el-2.2-api-0:7.0.70-25.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-javadoc-0:7.0.70-25.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-jsp-2.2-api-0:7.0.70-25.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-jsvc-0:7.0.70-25.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-lib-0:7.0.70-25.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-log4j-0:7.0.70-25.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-selinux-0:7.0.70-25.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-servlet-3.0-api-0:7.0.70-25.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-webapps-0:7.0.70-25.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-0:8.0.36-29.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-0:8.0.36-29.ep7.el7.src", "7Server-JWS-3.1:tomcat8-admin-webapps-0:8.0.36-29.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-docs-webapp-0:8.0.36-29.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-el-2.2-api-0:8.0.36-29.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-javadoc-0:8.0.36-29.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-jsp-2.3-api-0:8.0.36-29.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-jsvc-0:8.0.36-29.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-lib-0:8.0.36-29.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-log4j-0:8.0.36-29.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-selinux-0:8.0.36-29.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-servlet-3.1-api-0:8.0.36-29.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-webapps-0:8.0.36-29.ep7.el7.noarch" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "tomcat: Information Disclosure when using VirtualDirContext" }, { "cve": "CVE-2017-12617", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2017-09-21T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1494283" } ], "notes": [ { "category": "description", "text": "A vulnerability was discovered in Tomcat where if a servlet context was configured with readonly=false and HTTP PUT requests were allowed, an attacker could upload a JSP file to that context and achieve code execution.", "title": "Vulnerability description" }, { "category": "summary", "text": "tomcat: Remote Code Execution bypass for CVE-2017-12615", "title": "Vulnerability summary" }, { "category": "other", "text": "This flaw affects Tomcat on Red Hat Enterprise Linux only when a specific context is configured with readonly=false. The default configuration has a readonly context, so it is not affected.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Server-JWS-3.1:mod_cluster-0:1.3.8-2.Final_redhat_2.1.ep7.el6.noarch", "6Server-JWS-3.1:mod_cluster-0:1.3.8-2.Final_redhat_2.1.ep7.el6.src", "6Server-JWS-3.1:mod_cluster-tomcat7-0:1.3.8-2.Final_redhat_2.1.ep7.el6.noarch", "6Server-JWS-3.1:mod_cluster-tomcat8-0:1.3.8-2.Final_redhat_2.1.ep7.el6.noarch", "6Server-JWS-3.1:tomcat-native-0:1.2.8-11.redhat_11.ep7.el6.i686", "6Server-JWS-3.1:tomcat-native-0:1.2.8-11.redhat_11.ep7.el6.src", "6Server-JWS-3.1:tomcat-native-0:1.2.8-11.redhat_11.ep7.el6.x86_64", "6Server-JWS-3.1:tomcat-native-debuginfo-0:1.2.8-11.redhat_11.ep7.el6.i686", "6Server-JWS-3.1:tomcat-native-debuginfo-0:1.2.8-11.redhat_11.ep7.el6.x86_64", "6Server-JWS-3.1:tomcat-vault-0:1.1.6-1.Final_redhat_1.1.ep7.el6.noarch", "6Server-JWS-3.1:tomcat-vault-0:1.1.6-1.Final_redhat_1.1.ep7.el6.src", "6Server-JWS-3.1:tomcat-vault-tomcat7-0:1.1.6-1.Final_redhat_1.1.ep7.el6.noarch", "6Server-JWS-3.1:tomcat-vault-tomcat8-0:1.1.6-1.Final_redhat_1.1.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-0:7.0.70-25.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-0:7.0.70-25.ep7.el6.src", "6Server-JWS-3.1:tomcat7-admin-webapps-0:7.0.70-25.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-docs-webapp-0:7.0.70-25.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-el-2.2-api-0:7.0.70-25.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-javadoc-0:7.0.70-25.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-jsp-2.2-api-0:7.0.70-25.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-jsvc-0:7.0.70-25.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-lib-0:7.0.70-25.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-log4j-0:7.0.70-25.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-selinux-0:7.0.70-25.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-servlet-3.0-api-0:7.0.70-25.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-webapps-0:7.0.70-25.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-0:8.0.36-29.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-0:8.0.36-29.ep7.el6.src", "6Server-JWS-3.1:tomcat8-admin-webapps-0:8.0.36-29.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-docs-webapp-0:8.0.36-29.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-el-2.2-api-0:8.0.36-29.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-javadoc-0:8.0.36-29.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-jsp-2.3-api-0:8.0.36-29.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-jsvc-0:8.0.36-29.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-lib-0:8.0.36-29.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-log4j-0:8.0.36-29.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-selinux-0:8.0.36-29.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-servlet-3.1-api-0:8.0.36-29.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-webapps-0:8.0.36-29.ep7.el6.noarch", "7Server-JWS-3.1:mod_cluster-0:1.3.8-2.Final_redhat_2.1.ep7.el7.noarch", "7Server-JWS-3.1:mod_cluster-0:1.3.8-2.Final_redhat_2.1.ep7.el7.src", "7Server-JWS-3.1:mod_cluster-tomcat7-0:1.3.8-2.Final_redhat_2.1.ep7.el7.noarch", "7Server-JWS-3.1:mod_cluster-tomcat8-0:1.3.8-2.Final_redhat_2.1.ep7.el7.noarch", "7Server-JWS-3.1:tomcat-native-0:1.2.8-11.redhat_11.ep7.el7.src", "7Server-JWS-3.1:tomcat-native-0:1.2.8-11.redhat_11.ep7.el7.x86_64", "7Server-JWS-3.1:tomcat-native-debuginfo-0:1.2.8-11.redhat_11.ep7.el7.x86_64", "7Server-JWS-3.1:tomcat-vault-0:1.1.6-1.Final_redhat_1.1.ep7.el7.noarch", "7Server-JWS-3.1:tomcat-vault-0:1.1.6-1.Final_redhat_1.1.ep7.el7.src", "7Server-JWS-3.1:tomcat-vault-tomcat7-0:1.1.6-1.Final_redhat_1.1.ep7.el7.noarch", "7Server-JWS-3.1:tomcat-vault-tomcat8-0:1.1.6-1.Final_redhat_1.1.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-0:7.0.70-25.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-0:7.0.70-25.ep7.el7.src", "7Server-JWS-3.1:tomcat7-admin-webapps-0:7.0.70-25.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-docs-webapp-0:7.0.70-25.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-el-2.2-api-0:7.0.70-25.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-javadoc-0:7.0.70-25.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-jsp-2.2-api-0:7.0.70-25.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-jsvc-0:7.0.70-25.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-lib-0:7.0.70-25.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-log4j-0:7.0.70-25.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-selinux-0:7.0.70-25.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-servlet-3.0-api-0:7.0.70-25.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-webapps-0:7.0.70-25.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-0:8.0.36-29.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-0:8.0.36-29.ep7.el7.src", "7Server-JWS-3.1:tomcat8-admin-webapps-0:8.0.36-29.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-docs-webapp-0:8.0.36-29.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-el-2.2-api-0:8.0.36-29.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-javadoc-0:8.0.36-29.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-jsp-2.3-api-0:8.0.36-29.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-jsvc-0:8.0.36-29.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-lib-0:8.0.36-29.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-log4j-0:8.0.36-29.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-selinux-0:8.0.36-29.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-servlet-3.1-api-0:8.0.36-29.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-webapps-0:8.0.36-29.ep7.el7.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2017-12617" }, { "category": "external", "summary": "RHBZ#1494283", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1494283" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2017-12617", "url": "https://www.cve.org/CVERecord?id=CVE-2017-12617" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-12617", "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-12617" }, { "category": "external", "summary": "https://tomcat.apache.org/security-7.html", "url": "https://tomcat.apache.org/security-7.html" }, { "category": "external", "summary": "https://tomcat.apache.org/security-8.html", "url": "https://tomcat.apache.org/security-8.html" }, { "category": "external", "summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog", "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog" } ], "release_date": "2017-09-21T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-03-07T15:21:52+00:00", "details": "Before applying the update, back up your existing Red Hat JBoss Web Server installation (including all applications and configuration files).\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "6Server-JWS-3.1:mod_cluster-0:1.3.8-2.Final_redhat_2.1.ep7.el6.noarch", "6Server-JWS-3.1:mod_cluster-0:1.3.8-2.Final_redhat_2.1.ep7.el6.src", "6Server-JWS-3.1:mod_cluster-tomcat7-0:1.3.8-2.Final_redhat_2.1.ep7.el6.noarch", "6Server-JWS-3.1:mod_cluster-tomcat8-0:1.3.8-2.Final_redhat_2.1.ep7.el6.noarch", "6Server-JWS-3.1:tomcat-native-0:1.2.8-11.redhat_11.ep7.el6.i686", "6Server-JWS-3.1:tomcat-native-0:1.2.8-11.redhat_11.ep7.el6.src", "6Server-JWS-3.1:tomcat-native-0:1.2.8-11.redhat_11.ep7.el6.x86_64", "6Server-JWS-3.1:tomcat-native-debuginfo-0:1.2.8-11.redhat_11.ep7.el6.i686", "6Server-JWS-3.1:tomcat-native-debuginfo-0:1.2.8-11.redhat_11.ep7.el6.x86_64", "6Server-JWS-3.1:tomcat-vault-0:1.1.6-1.Final_redhat_1.1.ep7.el6.noarch", "6Server-JWS-3.1:tomcat-vault-0:1.1.6-1.Final_redhat_1.1.ep7.el6.src", "6Server-JWS-3.1:tomcat-vault-tomcat7-0:1.1.6-1.Final_redhat_1.1.ep7.el6.noarch", "6Server-JWS-3.1:tomcat-vault-tomcat8-0:1.1.6-1.Final_redhat_1.1.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-0:7.0.70-25.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-0:7.0.70-25.ep7.el6.src", "6Server-JWS-3.1:tomcat7-admin-webapps-0:7.0.70-25.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-docs-webapp-0:7.0.70-25.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-el-2.2-api-0:7.0.70-25.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-javadoc-0:7.0.70-25.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-jsp-2.2-api-0:7.0.70-25.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-jsvc-0:7.0.70-25.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-lib-0:7.0.70-25.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-log4j-0:7.0.70-25.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-selinux-0:7.0.70-25.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-servlet-3.0-api-0:7.0.70-25.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-webapps-0:7.0.70-25.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-0:8.0.36-29.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-0:8.0.36-29.ep7.el6.src", "6Server-JWS-3.1:tomcat8-admin-webapps-0:8.0.36-29.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-docs-webapp-0:8.0.36-29.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-el-2.2-api-0:8.0.36-29.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-javadoc-0:8.0.36-29.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-jsp-2.3-api-0:8.0.36-29.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-jsvc-0:8.0.36-29.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-lib-0:8.0.36-29.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-log4j-0:8.0.36-29.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-selinux-0:8.0.36-29.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-servlet-3.1-api-0:8.0.36-29.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-webapps-0:8.0.36-29.ep7.el6.noarch", "7Server-JWS-3.1:mod_cluster-0:1.3.8-2.Final_redhat_2.1.ep7.el7.noarch", "7Server-JWS-3.1:mod_cluster-0:1.3.8-2.Final_redhat_2.1.ep7.el7.src", "7Server-JWS-3.1:mod_cluster-tomcat7-0:1.3.8-2.Final_redhat_2.1.ep7.el7.noarch", "7Server-JWS-3.1:mod_cluster-tomcat8-0:1.3.8-2.Final_redhat_2.1.ep7.el7.noarch", "7Server-JWS-3.1:tomcat-native-0:1.2.8-11.redhat_11.ep7.el7.src", "7Server-JWS-3.1:tomcat-native-0:1.2.8-11.redhat_11.ep7.el7.x86_64", "7Server-JWS-3.1:tomcat-native-debuginfo-0:1.2.8-11.redhat_11.ep7.el7.x86_64", "7Server-JWS-3.1:tomcat-vault-0:1.1.6-1.Final_redhat_1.1.ep7.el7.noarch", "7Server-JWS-3.1:tomcat-vault-0:1.1.6-1.Final_redhat_1.1.ep7.el7.src", "7Server-JWS-3.1:tomcat-vault-tomcat7-0:1.1.6-1.Final_redhat_1.1.ep7.el7.noarch", "7Server-JWS-3.1:tomcat-vault-tomcat8-0:1.1.6-1.Final_redhat_1.1.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-0:7.0.70-25.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-0:7.0.70-25.ep7.el7.src", "7Server-JWS-3.1:tomcat7-admin-webapps-0:7.0.70-25.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-docs-webapp-0:7.0.70-25.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-el-2.2-api-0:7.0.70-25.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-javadoc-0:7.0.70-25.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-jsp-2.2-api-0:7.0.70-25.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-jsvc-0:7.0.70-25.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-lib-0:7.0.70-25.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-log4j-0:7.0.70-25.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-selinux-0:7.0.70-25.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-servlet-3.0-api-0:7.0.70-25.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-webapps-0:7.0.70-25.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-0:8.0.36-29.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-0:8.0.36-29.ep7.el7.src", "7Server-JWS-3.1:tomcat8-admin-webapps-0:8.0.36-29.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-docs-webapp-0:8.0.36-29.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-el-2.2-api-0:8.0.36-29.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-javadoc-0:8.0.36-29.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-jsp-2.3-api-0:8.0.36-29.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-jsvc-0:8.0.36-29.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-lib-0:8.0.36-29.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-log4j-0:8.0.36-29.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-selinux-0:8.0.36-29.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-servlet-3.1-api-0:8.0.36-29.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-webapps-0:8.0.36-29.ep7.el7.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2018:0466" }, { "category": "workaround", "details": "Ensure that readonly is set to true (the default) for the DefaultServlet, WebDAV servlet or application context.\n\nBlock HTTP methods that permit resource modification for untrusted users.", "product_ids": [ "6Server-JWS-3.1:mod_cluster-0:1.3.8-2.Final_redhat_2.1.ep7.el6.noarch", "6Server-JWS-3.1:mod_cluster-0:1.3.8-2.Final_redhat_2.1.ep7.el6.src", "6Server-JWS-3.1:mod_cluster-tomcat7-0:1.3.8-2.Final_redhat_2.1.ep7.el6.noarch", "6Server-JWS-3.1:mod_cluster-tomcat8-0:1.3.8-2.Final_redhat_2.1.ep7.el6.noarch", "6Server-JWS-3.1:tomcat-native-0:1.2.8-11.redhat_11.ep7.el6.i686", "6Server-JWS-3.1:tomcat-native-0:1.2.8-11.redhat_11.ep7.el6.src", "6Server-JWS-3.1:tomcat-native-0:1.2.8-11.redhat_11.ep7.el6.x86_64", "6Server-JWS-3.1:tomcat-native-debuginfo-0:1.2.8-11.redhat_11.ep7.el6.i686", "6Server-JWS-3.1:tomcat-native-debuginfo-0:1.2.8-11.redhat_11.ep7.el6.x86_64", "6Server-JWS-3.1:tomcat-vault-0:1.1.6-1.Final_redhat_1.1.ep7.el6.noarch", "6Server-JWS-3.1:tomcat-vault-0:1.1.6-1.Final_redhat_1.1.ep7.el6.src", "6Server-JWS-3.1:tomcat-vault-tomcat7-0:1.1.6-1.Final_redhat_1.1.ep7.el6.noarch", "6Server-JWS-3.1:tomcat-vault-tomcat8-0:1.1.6-1.Final_redhat_1.1.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-0:7.0.70-25.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-0:7.0.70-25.ep7.el6.src", "6Server-JWS-3.1:tomcat7-admin-webapps-0:7.0.70-25.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-docs-webapp-0:7.0.70-25.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-el-2.2-api-0:7.0.70-25.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-javadoc-0:7.0.70-25.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-jsp-2.2-api-0:7.0.70-25.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-jsvc-0:7.0.70-25.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-lib-0:7.0.70-25.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-log4j-0:7.0.70-25.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-selinux-0:7.0.70-25.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-servlet-3.0-api-0:7.0.70-25.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-webapps-0:7.0.70-25.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-0:8.0.36-29.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-0:8.0.36-29.ep7.el6.src", "6Server-JWS-3.1:tomcat8-admin-webapps-0:8.0.36-29.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-docs-webapp-0:8.0.36-29.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-el-2.2-api-0:8.0.36-29.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-javadoc-0:8.0.36-29.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-jsp-2.3-api-0:8.0.36-29.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-jsvc-0:8.0.36-29.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-lib-0:8.0.36-29.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-log4j-0:8.0.36-29.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-selinux-0:8.0.36-29.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-servlet-3.1-api-0:8.0.36-29.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-webapps-0:8.0.36-29.ep7.el6.noarch", "7Server-JWS-3.1:mod_cluster-0:1.3.8-2.Final_redhat_2.1.ep7.el7.noarch", "7Server-JWS-3.1:mod_cluster-0:1.3.8-2.Final_redhat_2.1.ep7.el7.src", "7Server-JWS-3.1:mod_cluster-tomcat7-0:1.3.8-2.Final_redhat_2.1.ep7.el7.noarch", "7Server-JWS-3.1:mod_cluster-tomcat8-0:1.3.8-2.Final_redhat_2.1.ep7.el7.noarch", "7Server-JWS-3.1:tomcat-native-0:1.2.8-11.redhat_11.ep7.el7.src", "7Server-JWS-3.1:tomcat-native-0:1.2.8-11.redhat_11.ep7.el7.x86_64", "7Server-JWS-3.1:tomcat-native-debuginfo-0:1.2.8-11.redhat_11.ep7.el7.x86_64", "7Server-JWS-3.1:tomcat-vault-0:1.1.6-1.Final_redhat_1.1.ep7.el7.noarch", "7Server-JWS-3.1:tomcat-vault-0:1.1.6-1.Final_redhat_1.1.ep7.el7.src", "7Server-JWS-3.1:tomcat-vault-tomcat7-0:1.1.6-1.Final_redhat_1.1.ep7.el7.noarch", "7Server-JWS-3.1:tomcat-vault-tomcat8-0:1.1.6-1.Final_redhat_1.1.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-0:7.0.70-25.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-0:7.0.70-25.ep7.el7.src", "7Server-JWS-3.1:tomcat7-admin-webapps-0:7.0.70-25.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-docs-webapp-0:7.0.70-25.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-el-2.2-api-0:7.0.70-25.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-javadoc-0:7.0.70-25.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-jsp-2.2-api-0:7.0.70-25.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-jsvc-0:7.0.70-25.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-lib-0:7.0.70-25.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-log4j-0:7.0.70-25.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-selinux-0:7.0.70-25.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-servlet-3.0-api-0:7.0.70-25.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-webapps-0:7.0.70-25.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-0:8.0.36-29.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-0:8.0.36-29.ep7.el7.src", "7Server-JWS-3.1:tomcat8-admin-webapps-0:8.0.36-29.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-docs-webapp-0:8.0.36-29.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-el-2.2-api-0:8.0.36-29.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-javadoc-0:8.0.36-29.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-jsp-2.3-api-0:8.0.36-29.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-jsvc-0:8.0.36-29.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-lib-0:8.0.36-29.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-log4j-0:8.0.36-29.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-selinux-0:8.0.36-29.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-servlet-3.1-api-0:8.0.36-29.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-webapps-0:8.0.36-29.ep7.el7.noarch" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "6Server-JWS-3.1:mod_cluster-0:1.3.8-2.Final_redhat_2.1.ep7.el6.noarch", "6Server-JWS-3.1:mod_cluster-0:1.3.8-2.Final_redhat_2.1.ep7.el6.src", "6Server-JWS-3.1:mod_cluster-tomcat7-0:1.3.8-2.Final_redhat_2.1.ep7.el6.noarch", "6Server-JWS-3.1:mod_cluster-tomcat8-0:1.3.8-2.Final_redhat_2.1.ep7.el6.noarch", "6Server-JWS-3.1:tomcat-native-0:1.2.8-11.redhat_11.ep7.el6.i686", "6Server-JWS-3.1:tomcat-native-0:1.2.8-11.redhat_11.ep7.el6.src", "6Server-JWS-3.1:tomcat-native-0:1.2.8-11.redhat_11.ep7.el6.x86_64", "6Server-JWS-3.1:tomcat-native-debuginfo-0:1.2.8-11.redhat_11.ep7.el6.i686", "6Server-JWS-3.1:tomcat-native-debuginfo-0:1.2.8-11.redhat_11.ep7.el6.x86_64", "6Server-JWS-3.1:tomcat-vault-0:1.1.6-1.Final_redhat_1.1.ep7.el6.noarch", "6Server-JWS-3.1:tomcat-vault-0:1.1.6-1.Final_redhat_1.1.ep7.el6.src", "6Server-JWS-3.1:tomcat-vault-tomcat7-0:1.1.6-1.Final_redhat_1.1.ep7.el6.noarch", "6Server-JWS-3.1:tomcat-vault-tomcat8-0:1.1.6-1.Final_redhat_1.1.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-0:7.0.70-25.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-0:7.0.70-25.ep7.el6.src", "6Server-JWS-3.1:tomcat7-admin-webapps-0:7.0.70-25.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-docs-webapp-0:7.0.70-25.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-el-2.2-api-0:7.0.70-25.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-javadoc-0:7.0.70-25.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-jsp-2.2-api-0:7.0.70-25.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-jsvc-0:7.0.70-25.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-lib-0:7.0.70-25.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-log4j-0:7.0.70-25.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-selinux-0:7.0.70-25.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-servlet-3.0-api-0:7.0.70-25.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-webapps-0:7.0.70-25.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-0:8.0.36-29.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-0:8.0.36-29.ep7.el6.src", "6Server-JWS-3.1:tomcat8-admin-webapps-0:8.0.36-29.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-docs-webapp-0:8.0.36-29.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-el-2.2-api-0:8.0.36-29.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-javadoc-0:8.0.36-29.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-jsp-2.3-api-0:8.0.36-29.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-jsvc-0:8.0.36-29.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-lib-0:8.0.36-29.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-log4j-0:8.0.36-29.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-selinux-0:8.0.36-29.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-servlet-3.1-api-0:8.0.36-29.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-webapps-0:8.0.36-29.ep7.el6.noarch", "7Server-JWS-3.1:mod_cluster-0:1.3.8-2.Final_redhat_2.1.ep7.el7.noarch", "7Server-JWS-3.1:mod_cluster-0:1.3.8-2.Final_redhat_2.1.ep7.el7.src", "7Server-JWS-3.1:mod_cluster-tomcat7-0:1.3.8-2.Final_redhat_2.1.ep7.el7.noarch", "7Server-JWS-3.1:mod_cluster-tomcat8-0:1.3.8-2.Final_redhat_2.1.ep7.el7.noarch", "7Server-JWS-3.1:tomcat-native-0:1.2.8-11.redhat_11.ep7.el7.src", "7Server-JWS-3.1:tomcat-native-0:1.2.8-11.redhat_11.ep7.el7.x86_64", "7Server-JWS-3.1:tomcat-native-debuginfo-0:1.2.8-11.redhat_11.ep7.el7.x86_64", "7Server-JWS-3.1:tomcat-vault-0:1.1.6-1.Final_redhat_1.1.ep7.el7.noarch", "7Server-JWS-3.1:tomcat-vault-0:1.1.6-1.Final_redhat_1.1.ep7.el7.src", "7Server-JWS-3.1:tomcat-vault-tomcat7-0:1.1.6-1.Final_redhat_1.1.ep7.el7.noarch", "7Server-JWS-3.1:tomcat-vault-tomcat8-0:1.1.6-1.Final_redhat_1.1.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-0:7.0.70-25.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-0:7.0.70-25.ep7.el7.src", "7Server-JWS-3.1:tomcat7-admin-webapps-0:7.0.70-25.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-docs-webapp-0:7.0.70-25.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-el-2.2-api-0:7.0.70-25.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-javadoc-0:7.0.70-25.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-jsp-2.2-api-0:7.0.70-25.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-jsvc-0:7.0.70-25.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-lib-0:7.0.70-25.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-log4j-0:7.0.70-25.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-selinux-0:7.0.70-25.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-servlet-3.0-api-0:7.0.70-25.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-webapps-0:7.0.70-25.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-0:8.0.36-29.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-0:8.0.36-29.ep7.el7.src", "7Server-JWS-3.1:tomcat8-admin-webapps-0:8.0.36-29.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-docs-webapp-0:8.0.36-29.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-el-2.2-api-0:8.0.36-29.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-javadoc-0:8.0.36-29.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-jsp-2.3-api-0:8.0.36-29.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-jsvc-0:8.0.36-29.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-lib-0:8.0.36-29.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-log4j-0:8.0.36-29.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-selinux-0:8.0.36-29.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-servlet-3.1-api-0:8.0.36-29.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-webapps-0:8.0.36-29.ep7.el7.noarch" ] } ], "threats": [ { "category": "exploit_status", "date": "2022-03-25T00:00:00+00:00", "details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog" }, { "category": "impact", "details": "Important" } ], "title": "tomcat: Remote Code Execution bypass for CVE-2017-12615" }, { "cve": "CVE-2017-15698", "cwe": { "id": "CWE-299", "name": "Improper Check for Certificate Revocation" }, "discovery_date": "2018-02-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1540824" } ], "notes": [ { "category": "description", "text": "When parsing the AIA-Extension field of a client certificate, Apache Tomcat Native Connector 1.2.0 to 1.2.14 and 1.1.23 to 1.1.34 did not correctly handle fields longer than 127 bytes. The result of the parsing error was to skip the OCSP check. It was therefore possible for client certificates that should have been rejected (if the OCSP check had been made) to be accepted. Users not using OCSP checks are not affected by this vulnerability.", "title": "Vulnerability description" }, { "category": "summary", "text": "tomcat-native: Mishandling of client certificates can allow for OCSP check bypass", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Server-JWS-3.1:mod_cluster-0:1.3.8-2.Final_redhat_2.1.ep7.el6.noarch", "6Server-JWS-3.1:mod_cluster-0:1.3.8-2.Final_redhat_2.1.ep7.el6.src", "6Server-JWS-3.1:mod_cluster-tomcat7-0:1.3.8-2.Final_redhat_2.1.ep7.el6.noarch", "6Server-JWS-3.1:mod_cluster-tomcat8-0:1.3.8-2.Final_redhat_2.1.ep7.el6.noarch", "6Server-JWS-3.1:tomcat-native-0:1.2.8-11.redhat_11.ep7.el6.i686", "6Server-JWS-3.1:tomcat-native-0:1.2.8-11.redhat_11.ep7.el6.src", "6Server-JWS-3.1:tomcat-native-0:1.2.8-11.redhat_11.ep7.el6.x86_64", "6Server-JWS-3.1:tomcat-native-debuginfo-0:1.2.8-11.redhat_11.ep7.el6.i686", "6Server-JWS-3.1:tomcat-native-debuginfo-0:1.2.8-11.redhat_11.ep7.el6.x86_64", "6Server-JWS-3.1:tomcat-vault-0:1.1.6-1.Final_redhat_1.1.ep7.el6.noarch", "6Server-JWS-3.1:tomcat-vault-0:1.1.6-1.Final_redhat_1.1.ep7.el6.src", "6Server-JWS-3.1:tomcat-vault-tomcat7-0:1.1.6-1.Final_redhat_1.1.ep7.el6.noarch", "6Server-JWS-3.1:tomcat-vault-tomcat8-0:1.1.6-1.Final_redhat_1.1.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-0:7.0.70-25.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-0:7.0.70-25.ep7.el6.src", "6Server-JWS-3.1:tomcat7-admin-webapps-0:7.0.70-25.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-docs-webapp-0:7.0.70-25.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-el-2.2-api-0:7.0.70-25.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-javadoc-0:7.0.70-25.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-jsp-2.2-api-0:7.0.70-25.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-jsvc-0:7.0.70-25.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-lib-0:7.0.70-25.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-log4j-0:7.0.70-25.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-selinux-0:7.0.70-25.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-servlet-3.0-api-0:7.0.70-25.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-webapps-0:7.0.70-25.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-0:8.0.36-29.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-0:8.0.36-29.ep7.el6.src", "6Server-JWS-3.1:tomcat8-admin-webapps-0:8.0.36-29.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-docs-webapp-0:8.0.36-29.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-el-2.2-api-0:8.0.36-29.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-javadoc-0:8.0.36-29.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-jsp-2.3-api-0:8.0.36-29.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-jsvc-0:8.0.36-29.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-lib-0:8.0.36-29.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-log4j-0:8.0.36-29.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-selinux-0:8.0.36-29.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-servlet-3.1-api-0:8.0.36-29.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-webapps-0:8.0.36-29.ep7.el6.noarch", "7Server-JWS-3.1:mod_cluster-0:1.3.8-2.Final_redhat_2.1.ep7.el7.noarch", "7Server-JWS-3.1:mod_cluster-0:1.3.8-2.Final_redhat_2.1.ep7.el7.src", "7Server-JWS-3.1:mod_cluster-tomcat7-0:1.3.8-2.Final_redhat_2.1.ep7.el7.noarch", "7Server-JWS-3.1:mod_cluster-tomcat8-0:1.3.8-2.Final_redhat_2.1.ep7.el7.noarch", "7Server-JWS-3.1:tomcat-native-0:1.2.8-11.redhat_11.ep7.el7.src", "7Server-JWS-3.1:tomcat-native-0:1.2.8-11.redhat_11.ep7.el7.x86_64", "7Server-JWS-3.1:tomcat-native-debuginfo-0:1.2.8-11.redhat_11.ep7.el7.x86_64", "7Server-JWS-3.1:tomcat-vault-0:1.1.6-1.Final_redhat_1.1.ep7.el7.noarch", "7Server-JWS-3.1:tomcat-vault-0:1.1.6-1.Final_redhat_1.1.ep7.el7.src", "7Server-JWS-3.1:tomcat-vault-tomcat7-0:1.1.6-1.Final_redhat_1.1.ep7.el7.noarch", "7Server-JWS-3.1:tomcat-vault-tomcat8-0:1.1.6-1.Final_redhat_1.1.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-0:7.0.70-25.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-0:7.0.70-25.ep7.el7.src", "7Server-JWS-3.1:tomcat7-admin-webapps-0:7.0.70-25.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-docs-webapp-0:7.0.70-25.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-el-2.2-api-0:7.0.70-25.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-javadoc-0:7.0.70-25.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-jsp-2.2-api-0:7.0.70-25.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-jsvc-0:7.0.70-25.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-lib-0:7.0.70-25.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-log4j-0:7.0.70-25.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-selinux-0:7.0.70-25.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-servlet-3.0-api-0:7.0.70-25.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-webapps-0:7.0.70-25.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-0:8.0.36-29.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-0:8.0.36-29.ep7.el7.src", "7Server-JWS-3.1:tomcat8-admin-webapps-0:8.0.36-29.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-docs-webapp-0:8.0.36-29.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-el-2.2-api-0:8.0.36-29.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-javadoc-0:8.0.36-29.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-jsp-2.3-api-0:8.0.36-29.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-jsvc-0:8.0.36-29.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-lib-0:8.0.36-29.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-log4j-0:8.0.36-29.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-selinux-0:8.0.36-29.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-servlet-3.1-api-0:8.0.36-29.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-webapps-0:8.0.36-29.ep7.el7.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2017-15698" }, { "category": "external", "summary": "RHBZ#1540824", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1540824" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2017-15698", "url": "https://www.cve.org/CVERecord?id=CVE-2017-15698" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-15698", "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-15698" } ], "release_date": "2018-01-31T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-03-07T15:21:52+00:00", "details": "Before applying the update, back up your existing Red Hat JBoss Web Server installation (including all applications and configuration files).\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "6Server-JWS-3.1:mod_cluster-0:1.3.8-2.Final_redhat_2.1.ep7.el6.noarch", "6Server-JWS-3.1:mod_cluster-0:1.3.8-2.Final_redhat_2.1.ep7.el6.src", "6Server-JWS-3.1:mod_cluster-tomcat7-0:1.3.8-2.Final_redhat_2.1.ep7.el6.noarch", "6Server-JWS-3.1:mod_cluster-tomcat8-0:1.3.8-2.Final_redhat_2.1.ep7.el6.noarch", "6Server-JWS-3.1:tomcat-native-0:1.2.8-11.redhat_11.ep7.el6.i686", "6Server-JWS-3.1:tomcat-native-0:1.2.8-11.redhat_11.ep7.el6.src", "6Server-JWS-3.1:tomcat-native-0:1.2.8-11.redhat_11.ep7.el6.x86_64", "6Server-JWS-3.1:tomcat-native-debuginfo-0:1.2.8-11.redhat_11.ep7.el6.i686", "6Server-JWS-3.1:tomcat-native-debuginfo-0:1.2.8-11.redhat_11.ep7.el6.x86_64", "6Server-JWS-3.1:tomcat-vault-0:1.1.6-1.Final_redhat_1.1.ep7.el6.noarch", "6Server-JWS-3.1:tomcat-vault-0:1.1.6-1.Final_redhat_1.1.ep7.el6.src", "6Server-JWS-3.1:tomcat-vault-tomcat7-0:1.1.6-1.Final_redhat_1.1.ep7.el6.noarch", "6Server-JWS-3.1:tomcat-vault-tomcat8-0:1.1.6-1.Final_redhat_1.1.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-0:7.0.70-25.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-0:7.0.70-25.ep7.el6.src", "6Server-JWS-3.1:tomcat7-admin-webapps-0:7.0.70-25.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-docs-webapp-0:7.0.70-25.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-el-2.2-api-0:7.0.70-25.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-javadoc-0:7.0.70-25.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-jsp-2.2-api-0:7.0.70-25.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-jsvc-0:7.0.70-25.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-lib-0:7.0.70-25.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-log4j-0:7.0.70-25.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-selinux-0:7.0.70-25.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-servlet-3.0-api-0:7.0.70-25.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-webapps-0:7.0.70-25.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-0:8.0.36-29.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-0:8.0.36-29.ep7.el6.src", "6Server-JWS-3.1:tomcat8-admin-webapps-0:8.0.36-29.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-docs-webapp-0:8.0.36-29.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-el-2.2-api-0:8.0.36-29.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-javadoc-0:8.0.36-29.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-jsp-2.3-api-0:8.0.36-29.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-jsvc-0:8.0.36-29.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-lib-0:8.0.36-29.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-log4j-0:8.0.36-29.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-selinux-0:8.0.36-29.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-servlet-3.1-api-0:8.0.36-29.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-webapps-0:8.0.36-29.ep7.el6.noarch", "7Server-JWS-3.1:mod_cluster-0:1.3.8-2.Final_redhat_2.1.ep7.el7.noarch", "7Server-JWS-3.1:mod_cluster-0:1.3.8-2.Final_redhat_2.1.ep7.el7.src", "7Server-JWS-3.1:mod_cluster-tomcat7-0:1.3.8-2.Final_redhat_2.1.ep7.el7.noarch", "7Server-JWS-3.1:mod_cluster-tomcat8-0:1.3.8-2.Final_redhat_2.1.ep7.el7.noarch", "7Server-JWS-3.1:tomcat-native-0:1.2.8-11.redhat_11.ep7.el7.src", "7Server-JWS-3.1:tomcat-native-0:1.2.8-11.redhat_11.ep7.el7.x86_64", "7Server-JWS-3.1:tomcat-native-debuginfo-0:1.2.8-11.redhat_11.ep7.el7.x86_64", "7Server-JWS-3.1:tomcat-vault-0:1.1.6-1.Final_redhat_1.1.ep7.el7.noarch", "7Server-JWS-3.1:tomcat-vault-0:1.1.6-1.Final_redhat_1.1.ep7.el7.src", "7Server-JWS-3.1:tomcat-vault-tomcat7-0:1.1.6-1.Final_redhat_1.1.ep7.el7.noarch", "7Server-JWS-3.1:tomcat-vault-tomcat8-0:1.1.6-1.Final_redhat_1.1.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-0:7.0.70-25.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-0:7.0.70-25.ep7.el7.src", "7Server-JWS-3.1:tomcat7-admin-webapps-0:7.0.70-25.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-docs-webapp-0:7.0.70-25.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-el-2.2-api-0:7.0.70-25.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-javadoc-0:7.0.70-25.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-jsp-2.2-api-0:7.0.70-25.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-jsvc-0:7.0.70-25.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-lib-0:7.0.70-25.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-log4j-0:7.0.70-25.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-selinux-0:7.0.70-25.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-servlet-3.0-api-0:7.0.70-25.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-webapps-0:7.0.70-25.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-0:8.0.36-29.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-0:8.0.36-29.ep7.el7.src", "7Server-JWS-3.1:tomcat8-admin-webapps-0:8.0.36-29.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-docs-webapp-0:8.0.36-29.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-el-2.2-api-0:8.0.36-29.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-javadoc-0:8.0.36-29.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-jsp-2.3-api-0:8.0.36-29.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-jsvc-0:8.0.36-29.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-lib-0:8.0.36-29.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-log4j-0:8.0.36-29.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-selinux-0:8.0.36-29.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-servlet-3.1-api-0:8.0.36-29.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-webapps-0:8.0.36-29.ep7.el7.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2018:0466" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N", "version": "3.0" }, "products": [ "6Server-JWS-3.1:mod_cluster-0:1.3.8-2.Final_redhat_2.1.ep7.el6.noarch", "6Server-JWS-3.1:mod_cluster-0:1.3.8-2.Final_redhat_2.1.ep7.el6.src", "6Server-JWS-3.1:mod_cluster-tomcat7-0:1.3.8-2.Final_redhat_2.1.ep7.el6.noarch", "6Server-JWS-3.1:mod_cluster-tomcat8-0:1.3.8-2.Final_redhat_2.1.ep7.el6.noarch", "6Server-JWS-3.1:tomcat-native-0:1.2.8-11.redhat_11.ep7.el6.i686", "6Server-JWS-3.1:tomcat-native-0:1.2.8-11.redhat_11.ep7.el6.src", "6Server-JWS-3.1:tomcat-native-0:1.2.8-11.redhat_11.ep7.el6.x86_64", "6Server-JWS-3.1:tomcat-native-debuginfo-0:1.2.8-11.redhat_11.ep7.el6.i686", "6Server-JWS-3.1:tomcat-native-debuginfo-0:1.2.8-11.redhat_11.ep7.el6.x86_64", "6Server-JWS-3.1:tomcat-vault-0:1.1.6-1.Final_redhat_1.1.ep7.el6.noarch", "6Server-JWS-3.1:tomcat-vault-0:1.1.6-1.Final_redhat_1.1.ep7.el6.src", "6Server-JWS-3.1:tomcat-vault-tomcat7-0:1.1.6-1.Final_redhat_1.1.ep7.el6.noarch", "6Server-JWS-3.1:tomcat-vault-tomcat8-0:1.1.6-1.Final_redhat_1.1.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-0:7.0.70-25.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-0:7.0.70-25.ep7.el6.src", "6Server-JWS-3.1:tomcat7-admin-webapps-0:7.0.70-25.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-docs-webapp-0:7.0.70-25.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-el-2.2-api-0:7.0.70-25.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-javadoc-0:7.0.70-25.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-jsp-2.2-api-0:7.0.70-25.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-jsvc-0:7.0.70-25.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-lib-0:7.0.70-25.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-log4j-0:7.0.70-25.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-selinux-0:7.0.70-25.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-servlet-3.0-api-0:7.0.70-25.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-webapps-0:7.0.70-25.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-0:8.0.36-29.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-0:8.0.36-29.ep7.el6.src", "6Server-JWS-3.1:tomcat8-admin-webapps-0:8.0.36-29.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-docs-webapp-0:8.0.36-29.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-el-2.2-api-0:8.0.36-29.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-javadoc-0:8.0.36-29.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-jsp-2.3-api-0:8.0.36-29.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-jsvc-0:8.0.36-29.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-lib-0:8.0.36-29.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-log4j-0:8.0.36-29.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-selinux-0:8.0.36-29.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-servlet-3.1-api-0:8.0.36-29.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-webapps-0:8.0.36-29.ep7.el6.noarch", "7Server-JWS-3.1:mod_cluster-0:1.3.8-2.Final_redhat_2.1.ep7.el7.noarch", "7Server-JWS-3.1:mod_cluster-0:1.3.8-2.Final_redhat_2.1.ep7.el7.src", "7Server-JWS-3.1:mod_cluster-tomcat7-0:1.3.8-2.Final_redhat_2.1.ep7.el7.noarch", "7Server-JWS-3.1:mod_cluster-tomcat8-0:1.3.8-2.Final_redhat_2.1.ep7.el7.noarch", "7Server-JWS-3.1:tomcat-native-0:1.2.8-11.redhat_11.ep7.el7.src", "7Server-JWS-3.1:tomcat-native-0:1.2.8-11.redhat_11.ep7.el7.x86_64", "7Server-JWS-3.1:tomcat-native-debuginfo-0:1.2.8-11.redhat_11.ep7.el7.x86_64", "7Server-JWS-3.1:tomcat-vault-0:1.1.6-1.Final_redhat_1.1.ep7.el7.noarch", "7Server-JWS-3.1:tomcat-vault-0:1.1.6-1.Final_redhat_1.1.ep7.el7.src", "7Server-JWS-3.1:tomcat-vault-tomcat7-0:1.1.6-1.Final_redhat_1.1.ep7.el7.noarch", "7Server-JWS-3.1:tomcat-vault-tomcat8-0:1.1.6-1.Final_redhat_1.1.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-0:7.0.70-25.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-0:7.0.70-25.ep7.el7.src", "7Server-JWS-3.1:tomcat7-admin-webapps-0:7.0.70-25.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-docs-webapp-0:7.0.70-25.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-el-2.2-api-0:7.0.70-25.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-javadoc-0:7.0.70-25.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-jsp-2.2-api-0:7.0.70-25.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-jsvc-0:7.0.70-25.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-lib-0:7.0.70-25.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-log4j-0:7.0.70-25.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-selinux-0:7.0.70-25.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-servlet-3.0-api-0:7.0.70-25.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-webapps-0:7.0.70-25.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-0:8.0.36-29.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-0:8.0.36-29.ep7.el7.src", "7Server-JWS-3.1:tomcat8-admin-webapps-0:8.0.36-29.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-docs-webapp-0:8.0.36-29.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-el-2.2-api-0:8.0.36-29.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-javadoc-0:8.0.36-29.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-jsp-2.3-api-0:8.0.36-29.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-jsvc-0:8.0.36-29.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-lib-0:8.0.36-29.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-log4j-0:8.0.36-29.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-selinux-0:8.0.36-29.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-servlet-3.1-api-0:8.0.36-29.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-webapps-0:8.0.36-29.ep7.el7.noarch" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "tomcat-native: Mishandling of client certificates can allow for OCSP check bypass" }, { "cve": "CVE-2018-1304", "cwe": { "id": "CWE-284", "name": "Improper Access Control" }, "discovery_date": "2018-02-23T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1548289" } ], "notes": [ { "category": "description", "text": "The URL pattern of \"\" (the empty string) which exactly maps to the context root was not correctly handled in Apache Tomcat 9.0.0.M1 to 9.0.4, 8.5.0 to 8.5.27, 8.0.0.RC1 to 8.0.49 and 7.0.0 to 7.0.84 when used as part of a security constraint definition. This caused the constraint to be ignored. It was, therefore, possible for unauthorised users to gain access to web application resources that should have been protected. Only security constraints with a URL pattern of the empty string were affected.", "title": "Vulnerability description" }, { "category": "summary", "text": "tomcat: Incorrect handling of empty string URL in security constraints can lead to unintended exposure of resources", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Server-JWS-3.1:mod_cluster-0:1.3.8-2.Final_redhat_2.1.ep7.el6.noarch", "6Server-JWS-3.1:mod_cluster-0:1.3.8-2.Final_redhat_2.1.ep7.el6.src", "6Server-JWS-3.1:mod_cluster-tomcat7-0:1.3.8-2.Final_redhat_2.1.ep7.el6.noarch", "6Server-JWS-3.1:mod_cluster-tomcat8-0:1.3.8-2.Final_redhat_2.1.ep7.el6.noarch", "6Server-JWS-3.1:tomcat-native-0:1.2.8-11.redhat_11.ep7.el6.i686", "6Server-JWS-3.1:tomcat-native-0:1.2.8-11.redhat_11.ep7.el6.src", "6Server-JWS-3.1:tomcat-native-0:1.2.8-11.redhat_11.ep7.el6.x86_64", "6Server-JWS-3.1:tomcat-native-debuginfo-0:1.2.8-11.redhat_11.ep7.el6.i686", "6Server-JWS-3.1:tomcat-native-debuginfo-0:1.2.8-11.redhat_11.ep7.el6.x86_64", "6Server-JWS-3.1:tomcat-vault-0:1.1.6-1.Final_redhat_1.1.ep7.el6.noarch", "6Server-JWS-3.1:tomcat-vault-0:1.1.6-1.Final_redhat_1.1.ep7.el6.src", "6Server-JWS-3.1:tomcat-vault-tomcat7-0:1.1.6-1.Final_redhat_1.1.ep7.el6.noarch", "6Server-JWS-3.1:tomcat-vault-tomcat8-0:1.1.6-1.Final_redhat_1.1.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-0:7.0.70-25.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-0:7.0.70-25.ep7.el6.src", "6Server-JWS-3.1:tomcat7-admin-webapps-0:7.0.70-25.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-docs-webapp-0:7.0.70-25.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-el-2.2-api-0:7.0.70-25.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-javadoc-0:7.0.70-25.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-jsp-2.2-api-0:7.0.70-25.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-jsvc-0:7.0.70-25.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-lib-0:7.0.70-25.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-log4j-0:7.0.70-25.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-selinux-0:7.0.70-25.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-servlet-3.0-api-0:7.0.70-25.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-webapps-0:7.0.70-25.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-0:8.0.36-29.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-0:8.0.36-29.ep7.el6.src", "6Server-JWS-3.1:tomcat8-admin-webapps-0:8.0.36-29.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-docs-webapp-0:8.0.36-29.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-el-2.2-api-0:8.0.36-29.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-javadoc-0:8.0.36-29.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-jsp-2.3-api-0:8.0.36-29.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-jsvc-0:8.0.36-29.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-lib-0:8.0.36-29.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-log4j-0:8.0.36-29.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-selinux-0:8.0.36-29.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-servlet-3.1-api-0:8.0.36-29.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-webapps-0:8.0.36-29.ep7.el6.noarch", "7Server-JWS-3.1:mod_cluster-0:1.3.8-2.Final_redhat_2.1.ep7.el7.noarch", "7Server-JWS-3.1:mod_cluster-0:1.3.8-2.Final_redhat_2.1.ep7.el7.src", "7Server-JWS-3.1:mod_cluster-tomcat7-0:1.3.8-2.Final_redhat_2.1.ep7.el7.noarch", "7Server-JWS-3.1:mod_cluster-tomcat8-0:1.3.8-2.Final_redhat_2.1.ep7.el7.noarch", "7Server-JWS-3.1:tomcat-native-0:1.2.8-11.redhat_11.ep7.el7.src", "7Server-JWS-3.1:tomcat-native-0:1.2.8-11.redhat_11.ep7.el7.x86_64", "7Server-JWS-3.1:tomcat-native-debuginfo-0:1.2.8-11.redhat_11.ep7.el7.x86_64", "7Server-JWS-3.1:tomcat-vault-0:1.1.6-1.Final_redhat_1.1.ep7.el7.noarch", "7Server-JWS-3.1:tomcat-vault-0:1.1.6-1.Final_redhat_1.1.ep7.el7.src", "7Server-JWS-3.1:tomcat-vault-tomcat7-0:1.1.6-1.Final_redhat_1.1.ep7.el7.noarch", "7Server-JWS-3.1:tomcat-vault-tomcat8-0:1.1.6-1.Final_redhat_1.1.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-0:7.0.70-25.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-0:7.0.70-25.ep7.el7.src", "7Server-JWS-3.1:tomcat7-admin-webapps-0:7.0.70-25.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-docs-webapp-0:7.0.70-25.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-el-2.2-api-0:7.0.70-25.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-javadoc-0:7.0.70-25.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-jsp-2.2-api-0:7.0.70-25.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-jsvc-0:7.0.70-25.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-lib-0:7.0.70-25.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-log4j-0:7.0.70-25.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-selinux-0:7.0.70-25.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-servlet-3.0-api-0:7.0.70-25.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-webapps-0:7.0.70-25.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-0:8.0.36-29.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-0:8.0.36-29.ep7.el7.src", "7Server-JWS-3.1:tomcat8-admin-webapps-0:8.0.36-29.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-docs-webapp-0:8.0.36-29.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-el-2.2-api-0:8.0.36-29.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-javadoc-0:8.0.36-29.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-jsp-2.3-api-0:8.0.36-29.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-jsvc-0:8.0.36-29.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-lib-0:8.0.36-29.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-log4j-0:8.0.36-29.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-selinux-0:8.0.36-29.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-servlet-3.1-api-0:8.0.36-29.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-webapps-0:8.0.36-29.ep7.el7.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-1304" }, { "category": "external", "summary": "RHBZ#1548289", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1548289" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-1304", "url": "https://www.cve.org/CVERecord?id=CVE-2018-1304" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-1304", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-1304" }, { "category": "external", "summary": "https://tomcat.apache.org/security-7.html#Fixed_in_Apache_Tomcat_7.0.85", "url": "https://tomcat.apache.org/security-7.html#Fixed_in_Apache_Tomcat_7.0.85" }, { "category": "external", "summary": "https://tomcat.apache.org/security-8.html#Fixed_in_Apache_Tomcat_8.0.50", "url": "https://tomcat.apache.org/security-8.html#Fixed_in_Apache_Tomcat_8.0.50" }, { "category": "external", "summary": "https://tomcat.apache.org/security-8.html#Fixed_in_Apache_Tomcat_8.5.28", "url": "https://tomcat.apache.org/security-8.html#Fixed_in_Apache_Tomcat_8.5.28" } ], "release_date": "2018-01-31T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-03-07T15:21:52+00:00", "details": "Before applying the update, back up your existing Red Hat JBoss Web Server installation (including all applications and configuration files).\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "6Server-JWS-3.1:mod_cluster-0:1.3.8-2.Final_redhat_2.1.ep7.el6.noarch", "6Server-JWS-3.1:mod_cluster-0:1.3.8-2.Final_redhat_2.1.ep7.el6.src", "6Server-JWS-3.1:mod_cluster-tomcat7-0:1.3.8-2.Final_redhat_2.1.ep7.el6.noarch", "6Server-JWS-3.1:mod_cluster-tomcat8-0:1.3.8-2.Final_redhat_2.1.ep7.el6.noarch", "6Server-JWS-3.1:tomcat-native-0:1.2.8-11.redhat_11.ep7.el6.i686", "6Server-JWS-3.1:tomcat-native-0:1.2.8-11.redhat_11.ep7.el6.src", "6Server-JWS-3.1:tomcat-native-0:1.2.8-11.redhat_11.ep7.el6.x86_64", "6Server-JWS-3.1:tomcat-native-debuginfo-0:1.2.8-11.redhat_11.ep7.el6.i686", "6Server-JWS-3.1:tomcat-native-debuginfo-0:1.2.8-11.redhat_11.ep7.el6.x86_64", "6Server-JWS-3.1:tomcat-vault-0:1.1.6-1.Final_redhat_1.1.ep7.el6.noarch", "6Server-JWS-3.1:tomcat-vault-0:1.1.6-1.Final_redhat_1.1.ep7.el6.src", "6Server-JWS-3.1:tomcat-vault-tomcat7-0:1.1.6-1.Final_redhat_1.1.ep7.el6.noarch", "6Server-JWS-3.1:tomcat-vault-tomcat8-0:1.1.6-1.Final_redhat_1.1.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-0:7.0.70-25.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-0:7.0.70-25.ep7.el6.src", "6Server-JWS-3.1:tomcat7-admin-webapps-0:7.0.70-25.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-docs-webapp-0:7.0.70-25.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-el-2.2-api-0:7.0.70-25.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-javadoc-0:7.0.70-25.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-jsp-2.2-api-0:7.0.70-25.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-jsvc-0:7.0.70-25.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-lib-0:7.0.70-25.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-log4j-0:7.0.70-25.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-selinux-0:7.0.70-25.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-servlet-3.0-api-0:7.0.70-25.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-webapps-0:7.0.70-25.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-0:8.0.36-29.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-0:8.0.36-29.ep7.el6.src", "6Server-JWS-3.1:tomcat8-admin-webapps-0:8.0.36-29.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-docs-webapp-0:8.0.36-29.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-el-2.2-api-0:8.0.36-29.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-javadoc-0:8.0.36-29.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-jsp-2.3-api-0:8.0.36-29.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-jsvc-0:8.0.36-29.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-lib-0:8.0.36-29.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-log4j-0:8.0.36-29.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-selinux-0:8.0.36-29.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-servlet-3.1-api-0:8.0.36-29.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-webapps-0:8.0.36-29.ep7.el6.noarch", "7Server-JWS-3.1:mod_cluster-0:1.3.8-2.Final_redhat_2.1.ep7.el7.noarch", "7Server-JWS-3.1:mod_cluster-0:1.3.8-2.Final_redhat_2.1.ep7.el7.src", "7Server-JWS-3.1:mod_cluster-tomcat7-0:1.3.8-2.Final_redhat_2.1.ep7.el7.noarch", "7Server-JWS-3.1:mod_cluster-tomcat8-0:1.3.8-2.Final_redhat_2.1.ep7.el7.noarch", "7Server-JWS-3.1:tomcat-native-0:1.2.8-11.redhat_11.ep7.el7.src", "7Server-JWS-3.1:tomcat-native-0:1.2.8-11.redhat_11.ep7.el7.x86_64", "7Server-JWS-3.1:tomcat-native-debuginfo-0:1.2.8-11.redhat_11.ep7.el7.x86_64", "7Server-JWS-3.1:tomcat-vault-0:1.1.6-1.Final_redhat_1.1.ep7.el7.noarch", "7Server-JWS-3.1:tomcat-vault-0:1.1.6-1.Final_redhat_1.1.ep7.el7.src", "7Server-JWS-3.1:tomcat-vault-tomcat7-0:1.1.6-1.Final_redhat_1.1.ep7.el7.noarch", "7Server-JWS-3.1:tomcat-vault-tomcat8-0:1.1.6-1.Final_redhat_1.1.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-0:7.0.70-25.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-0:7.0.70-25.ep7.el7.src", "7Server-JWS-3.1:tomcat7-admin-webapps-0:7.0.70-25.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-docs-webapp-0:7.0.70-25.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-el-2.2-api-0:7.0.70-25.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-javadoc-0:7.0.70-25.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-jsp-2.2-api-0:7.0.70-25.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-jsvc-0:7.0.70-25.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-lib-0:7.0.70-25.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-log4j-0:7.0.70-25.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-selinux-0:7.0.70-25.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-servlet-3.0-api-0:7.0.70-25.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-webapps-0:7.0.70-25.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-0:8.0.36-29.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-0:8.0.36-29.ep7.el7.src", "7Server-JWS-3.1:tomcat8-admin-webapps-0:8.0.36-29.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-docs-webapp-0:8.0.36-29.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-el-2.2-api-0:8.0.36-29.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-javadoc-0:8.0.36-29.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-jsp-2.3-api-0:8.0.36-29.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-jsvc-0:8.0.36-29.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-lib-0:8.0.36-29.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-log4j-0:8.0.36-29.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-selinux-0:8.0.36-29.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-servlet-3.1-api-0:8.0.36-29.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-webapps-0:8.0.36-29.ep7.el7.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2018:0466" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N", "version": "3.0" }, "products": [ "6Server-JWS-3.1:mod_cluster-0:1.3.8-2.Final_redhat_2.1.ep7.el6.noarch", "6Server-JWS-3.1:mod_cluster-0:1.3.8-2.Final_redhat_2.1.ep7.el6.src", "6Server-JWS-3.1:mod_cluster-tomcat7-0:1.3.8-2.Final_redhat_2.1.ep7.el6.noarch", "6Server-JWS-3.1:mod_cluster-tomcat8-0:1.3.8-2.Final_redhat_2.1.ep7.el6.noarch", "6Server-JWS-3.1:tomcat-native-0:1.2.8-11.redhat_11.ep7.el6.i686", "6Server-JWS-3.1:tomcat-native-0:1.2.8-11.redhat_11.ep7.el6.src", "6Server-JWS-3.1:tomcat-native-0:1.2.8-11.redhat_11.ep7.el6.x86_64", "6Server-JWS-3.1:tomcat-native-debuginfo-0:1.2.8-11.redhat_11.ep7.el6.i686", "6Server-JWS-3.1:tomcat-native-debuginfo-0:1.2.8-11.redhat_11.ep7.el6.x86_64", "6Server-JWS-3.1:tomcat-vault-0:1.1.6-1.Final_redhat_1.1.ep7.el6.noarch", "6Server-JWS-3.1:tomcat-vault-0:1.1.6-1.Final_redhat_1.1.ep7.el6.src", "6Server-JWS-3.1:tomcat-vault-tomcat7-0:1.1.6-1.Final_redhat_1.1.ep7.el6.noarch", "6Server-JWS-3.1:tomcat-vault-tomcat8-0:1.1.6-1.Final_redhat_1.1.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-0:7.0.70-25.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-0:7.0.70-25.ep7.el6.src", "6Server-JWS-3.1:tomcat7-admin-webapps-0:7.0.70-25.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-docs-webapp-0:7.0.70-25.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-el-2.2-api-0:7.0.70-25.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-javadoc-0:7.0.70-25.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-jsp-2.2-api-0:7.0.70-25.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-jsvc-0:7.0.70-25.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-lib-0:7.0.70-25.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-log4j-0:7.0.70-25.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-selinux-0:7.0.70-25.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-servlet-3.0-api-0:7.0.70-25.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-webapps-0:7.0.70-25.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-0:8.0.36-29.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-0:8.0.36-29.ep7.el6.src", "6Server-JWS-3.1:tomcat8-admin-webapps-0:8.0.36-29.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-docs-webapp-0:8.0.36-29.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-el-2.2-api-0:8.0.36-29.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-javadoc-0:8.0.36-29.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-jsp-2.3-api-0:8.0.36-29.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-jsvc-0:8.0.36-29.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-lib-0:8.0.36-29.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-log4j-0:8.0.36-29.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-selinux-0:8.0.36-29.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-servlet-3.1-api-0:8.0.36-29.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-webapps-0:8.0.36-29.ep7.el6.noarch", "7Server-JWS-3.1:mod_cluster-0:1.3.8-2.Final_redhat_2.1.ep7.el7.noarch", "7Server-JWS-3.1:mod_cluster-0:1.3.8-2.Final_redhat_2.1.ep7.el7.src", "7Server-JWS-3.1:mod_cluster-tomcat7-0:1.3.8-2.Final_redhat_2.1.ep7.el7.noarch", "7Server-JWS-3.1:mod_cluster-tomcat8-0:1.3.8-2.Final_redhat_2.1.ep7.el7.noarch", "7Server-JWS-3.1:tomcat-native-0:1.2.8-11.redhat_11.ep7.el7.src", "7Server-JWS-3.1:tomcat-native-0:1.2.8-11.redhat_11.ep7.el7.x86_64", "7Server-JWS-3.1:tomcat-native-debuginfo-0:1.2.8-11.redhat_11.ep7.el7.x86_64", "7Server-JWS-3.1:tomcat-vault-0:1.1.6-1.Final_redhat_1.1.ep7.el7.noarch", "7Server-JWS-3.1:tomcat-vault-0:1.1.6-1.Final_redhat_1.1.ep7.el7.src", "7Server-JWS-3.1:tomcat-vault-tomcat7-0:1.1.6-1.Final_redhat_1.1.ep7.el7.noarch", "7Server-JWS-3.1:tomcat-vault-tomcat8-0:1.1.6-1.Final_redhat_1.1.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-0:7.0.70-25.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-0:7.0.70-25.ep7.el7.src", "7Server-JWS-3.1:tomcat7-admin-webapps-0:7.0.70-25.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-docs-webapp-0:7.0.70-25.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-el-2.2-api-0:7.0.70-25.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-javadoc-0:7.0.70-25.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-jsp-2.2-api-0:7.0.70-25.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-jsvc-0:7.0.70-25.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-lib-0:7.0.70-25.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-log4j-0:7.0.70-25.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-selinux-0:7.0.70-25.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-servlet-3.0-api-0:7.0.70-25.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-webapps-0:7.0.70-25.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-0:8.0.36-29.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-0:8.0.36-29.ep7.el7.src", "7Server-JWS-3.1:tomcat8-admin-webapps-0:8.0.36-29.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-docs-webapp-0:8.0.36-29.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-el-2.2-api-0:8.0.36-29.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-javadoc-0:8.0.36-29.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-jsp-2.3-api-0:8.0.36-29.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-jsvc-0:8.0.36-29.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-lib-0:8.0.36-29.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-log4j-0:8.0.36-29.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-selinux-0:8.0.36-29.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-servlet-3.1-api-0:8.0.36-29.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-webapps-0:8.0.36-29.ep7.el7.noarch" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "tomcat: Incorrect handling of empty string URL in security constraints can lead to unintended exposure of resources" }, { "cve": "CVE-2018-1305", "cwe": { "id": "CWE-284", "name": "Improper Access Control" }, "discovery_date": "2018-02-23T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1548282" } ], "notes": [ { "category": "description", "text": "Security constraints defined by annotations of Servlets in Apache Tomcat 9.0.0.M1 to 9.0.4, 8.5.0 to 8.5.27, 8.0.0.RC1 to 8.0.49 and 7.0.0 to 7.0.84 were only applied once a Servlet had been loaded. Because security constraints defined in this way apply to the URL pattern and any URLs below that point, it was possible - depending on the order Servlets were loaded - for some security constraints not to be applied. This could have exposed resources to users who were not authorised to access them.", "title": "Vulnerability description" }, { "category": "summary", "text": "tomcat: Late application of security constraints can lead to resource exposure for unauthorised users", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Server-JWS-3.1:mod_cluster-0:1.3.8-2.Final_redhat_2.1.ep7.el6.noarch", "6Server-JWS-3.1:mod_cluster-0:1.3.8-2.Final_redhat_2.1.ep7.el6.src", "6Server-JWS-3.1:mod_cluster-tomcat7-0:1.3.8-2.Final_redhat_2.1.ep7.el6.noarch", "6Server-JWS-3.1:mod_cluster-tomcat8-0:1.3.8-2.Final_redhat_2.1.ep7.el6.noarch", "6Server-JWS-3.1:tomcat-native-0:1.2.8-11.redhat_11.ep7.el6.i686", "6Server-JWS-3.1:tomcat-native-0:1.2.8-11.redhat_11.ep7.el6.src", "6Server-JWS-3.1:tomcat-native-0:1.2.8-11.redhat_11.ep7.el6.x86_64", "6Server-JWS-3.1:tomcat-native-debuginfo-0:1.2.8-11.redhat_11.ep7.el6.i686", "6Server-JWS-3.1:tomcat-native-debuginfo-0:1.2.8-11.redhat_11.ep7.el6.x86_64", "6Server-JWS-3.1:tomcat-vault-0:1.1.6-1.Final_redhat_1.1.ep7.el6.noarch", "6Server-JWS-3.1:tomcat-vault-0:1.1.6-1.Final_redhat_1.1.ep7.el6.src", "6Server-JWS-3.1:tomcat-vault-tomcat7-0:1.1.6-1.Final_redhat_1.1.ep7.el6.noarch", "6Server-JWS-3.1:tomcat-vault-tomcat8-0:1.1.6-1.Final_redhat_1.1.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-0:7.0.70-25.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-0:7.0.70-25.ep7.el6.src", "6Server-JWS-3.1:tomcat7-admin-webapps-0:7.0.70-25.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-docs-webapp-0:7.0.70-25.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-el-2.2-api-0:7.0.70-25.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-javadoc-0:7.0.70-25.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-jsp-2.2-api-0:7.0.70-25.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-jsvc-0:7.0.70-25.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-lib-0:7.0.70-25.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-log4j-0:7.0.70-25.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-selinux-0:7.0.70-25.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-servlet-3.0-api-0:7.0.70-25.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-webapps-0:7.0.70-25.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-0:8.0.36-29.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-0:8.0.36-29.ep7.el6.src", "6Server-JWS-3.1:tomcat8-admin-webapps-0:8.0.36-29.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-docs-webapp-0:8.0.36-29.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-el-2.2-api-0:8.0.36-29.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-javadoc-0:8.0.36-29.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-jsp-2.3-api-0:8.0.36-29.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-jsvc-0:8.0.36-29.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-lib-0:8.0.36-29.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-log4j-0:8.0.36-29.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-selinux-0:8.0.36-29.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-servlet-3.1-api-0:8.0.36-29.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-webapps-0:8.0.36-29.ep7.el6.noarch", "7Server-JWS-3.1:mod_cluster-0:1.3.8-2.Final_redhat_2.1.ep7.el7.noarch", "7Server-JWS-3.1:mod_cluster-0:1.3.8-2.Final_redhat_2.1.ep7.el7.src", "7Server-JWS-3.1:mod_cluster-tomcat7-0:1.3.8-2.Final_redhat_2.1.ep7.el7.noarch", "7Server-JWS-3.1:mod_cluster-tomcat8-0:1.3.8-2.Final_redhat_2.1.ep7.el7.noarch", "7Server-JWS-3.1:tomcat-native-0:1.2.8-11.redhat_11.ep7.el7.src", "7Server-JWS-3.1:tomcat-native-0:1.2.8-11.redhat_11.ep7.el7.x86_64", "7Server-JWS-3.1:tomcat-native-debuginfo-0:1.2.8-11.redhat_11.ep7.el7.x86_64", "7Server-JWS-3.1:tomcat-vault-0:1.1.6-1.Final_redhat_1.1.ep7.el7.noarch", "7Server-JWS-3.1:tomcat-vault-0:1.1.6-1.Final_redhat_1.1.ep7.el7.src", "7Server-JWS-3.1:tomcat-vault-tomcat7-0:1.1.6-1.Final_redhat_1.1.ep7.el7.noarch", "7Server-JWS-3.1:tomcat-vault-tomcat8-0:1.1.6-1.Final_redhat_1.1.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-0:7.0.70-25.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-0:7.0.70-25.ep7.el7.src", "7Server-JWS-3.1:tomcat7-admin-webapps-0:7.0.70-25.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-docs-webapp-0:7.0.70-25.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-el-2.2-api-0:7.0.70-25.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-javadoc-0:7.0.70-25.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-jsp-2.2-api-0:7.0.70-25.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-jsvc-0:7.0.70-25.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-lib-0:7.0.70-25.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-log4j-0:7.0.70-25.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-selinux-0:7.0.70-25.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-servlet-3.0-api-0:7.0.70-25.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-webapps-0:7.0.70-25.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-0:8.0.36-29.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-0:8.0.36-29.ep7.el7.src", "7Server-JWS-3.1:tomcat8-admin-webapps-0:8.0.36-29.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-docs-webapp-0:8.0.36-29.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-el-2.2-api-0:8.0.36-29.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-javadoc-0:8.0.36-29.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-jsp-2.3-api-0:8.0.36-29.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-jsvc-0:8.0.36-29.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-lib-0:8.0.36-29.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-log4j-0:8.0.36-29.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-selinux-0:8.0.36-29.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-servlet-3.1-api-0:8.0.36-29.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-webapps-0:8.0.36-29.ep7.el7.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-1305" }, { "category": "external", "summary": "RHBZ#1548282", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1548282" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-1305", "url": "https://www.cve.org/CVERecord?id=CVE-2018-1305" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-1305", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-1305" }, { "category": "external", "summary": "https://tomcat.apache.org/security-7.html#Fixed_in_Apache_Tomcat_7.0.85", "url": "https://tomcat.apache.org/security-7.html#Fixed_in_Apache_Tomcat_7.0.85" }, { "category": "external", "summary": "https://tomcat.apache.org/security-8.html#Fixed_in_Apache_Tomcat_8.0.50", "url": "https://tomcat.apache.org/security-8.html#Fixed_in_Apache_Tomcat_8.0.50" }, { "category": "external", "summary": "https://tomcat.apache.org/security-8.html#Fixed_in_Apache_Tomcat_8.5.28", "url": "https://tomcat.apache.org/security-8.html#Fixed_in_Apache_Tomcat_8.5.28" } ], "release_date": "2018-02-23T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-03-07T15:21:52+00:00", "details": "Before applying the update, back up your existing Red Hat JBoss Web Server installation (including all applications and configuration files).\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "6Server-JWS-3.1:mod_cluster-0:1.3.8-2.Final_redhat_2.1.ep7.el6.noarch", "6Server-JWS-3.1:mod_cluster-0:1.3.8-2.Final_redhat_2.1.ep7.el6.src", "6Server-JWS-3.1:mod_cluster-tomcat7-0:1.3.8-2.Final_redhat_2.1.ep7.el6.noarch", "6Server-JWS-3.1:mod_cluster-tomcat8-0:1.3.8-2.Final_redhat_2.1.ep7.el6.noarch", "6Server-JWS-3.1:tomcat-native-0:1.2.8-11.redhat_11.ep7.el6.i686", "6Server-JWS-3.1:tomcat-native-0:1.2.8-11.redhat_11.ep7.el6.src", "6Server-JWS-3.1:tomcat-native-0:1.2.8-11.redhat_11.ep7.el6.x86_64", "6Server-JWS-3.1:tomcat-native-debuginfo-0:1.2.8-11.redhat_11.ep7.el6.i686", "6Server-JWS-3.1:tomcat-native-debuginfo-0:1.2.8-11.redhat_11.ep7.el6.x86_64", "6Server-JWS-3.1:tomcat-vault-0:1.1.6-1.Final_redhat_1.1.ep7.el6.noarch", "6Server-JWS-3.1:tomcat-vault-0:1.1.6-1.Final_redhat_1.1.ep7.el6.src", "6Server-JWS-3.1:tomcat-vault-tomcat7-0:1.1.6-1.Final_redhat_1.1.ep7.el6.noarch", "6Server-JWS-3.1:tomcat-vault-tomcat8-0:1.1.6-1.Final_redhat_1.1.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-0:7.0.70-25.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-0:7.0.70-25.ep7.el6.src", "6Server-JWS-3.1:tomcat7-admin-webapps-0:7.0.70-25.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-docs-webapp-0:7.0.70-25.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-el-2.2-api-0:7.0.70-25.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-javadoc-0:7.0.70-25.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-jsp-2.2-api-0:7.0.70-25.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-jsvc-0:7.0.70-25.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-lib-0:7.0.70-25.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-log4j-0:7.0.70-25.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-selinux-0:7.0.70-25.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-servlet-3.0-api-0:7.0.70-25.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-webapps-0:7.0.70-25.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-0:8.0.36-29.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-0:8.0.36-29.ep7.el6.src", "6Server-JWS-3.1:tomcat8-admin-webapps-0:8.0.36-29.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-docs-webapp-0:8.0.36-29.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-el-2.2-api-0:8.0.36-29.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-javadoc-0:8.0.36-29.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-jsp-2.3-api-0:8.0.36-29.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-jsvc-0:8.0.36-29.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-lib-0:8.0.36-29.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-log4j-0:8.0.36-29.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-selinux-0:8.0.36-29.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-servlet-3.1-api-0:8.0.36-29.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-webapps-0:8.0.36-29.ep7.el6.noarch", "7Server-JWS-3.1:mod_cluster-0:1.3.8-2.Final_redhat_2.1.ep7.el7.noarch", "7Server-JWS-3.1:mod_cluster-0:1.3.8-2.Final_redhat_2.1.ep7.el7.src", "7Server-JWS-3.1:mod_cluster-tomcat7-0:1.3.8-2.Final_redhat_2.1.ep7.el7.noarch", "7Server-JWS-3.1:mod_cluster-tomcat8-0:1.3.8-2.Final_redhat_2.1.ep7.el7.noarch", "7Server-JWS-3.1:tomcat-native-0:1.2.8-11.redhat_11.ep7.el7.src", "7Server-JWS-3.1:tomcat-native-0:1.2.8-11.redhat_11.ep7.el7.x86_64", "7Server-JWS-3.1:tomcat-native-debuginfo-0:1.2.8-11.redhat_11.ep7.el7.x86_64", "7Server-JWS-3.1:tomcat-vault-0:1.1.6-1.Final_redhat_1.1.ep7.el7.noarch", "7Server-JWS-3.1:tomcat-vault-0:1.1.6-1.Final_redhat_1.1.ep7.el7.src", "7Server-JWS-3.1:tomcat-vault-tomcat7-0:1.1.6-1.Final_redhat_1.1.ep7.el7.noarch", "7Server-JWS-3.1:tomcat-vault-tomcat8-0:1.1.6-1.Final_redhat_1.1.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-0:7.0.70-25.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-0:7.0.70-25.ep7.el7.src", "7Server-JWS-3.1:tomcat7-admin-webapps-0:7.0.70-25.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-docs-webapp-0:7.0.70-25.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-el-2.2-api-0:7.0.70-25.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-javadoc-0:7.0.70-25.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-jsp-2.2-api-0:7.0.70-25.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-jsvc-0:7.0.70-25.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-lib-0:7.0.70-25.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-log4j-0:7.0.70-25.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-selinux-0:7.0.70-25.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-servlet-3.0-api-0:7.0.70-25.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-webapps-0:7.0.70-25.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-0:8.0.36-29.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-0:8.0.36-29.ep7.el7.src", "7Server-JWS-3.1:tomcat8-admin-webapps-0:8.0.36-29.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-docs-webapp-0:8.0.36-29.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-el-2.2-api-0:8.0.36-29.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-javadoc-0:8.0.36-29.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-jsp-2.3-api-0:8.0.36-29.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-jsvc-0:8.0.36-29.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-lib-0:8.0.36-29.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-log4j-0:8.0.36-29.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-selinux-0:8.0.36-29.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-servlet-3.1-api-0:8.0.36-29.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-webapps-0:8.0.36-29.ep7.el7.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2018:0466" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N", "version": "3.0" }, "products": [ "6Server-JWS-3.1:mod_cluster-0:1.3.8-2.Final_redhat_2.1.ep7.el6.noarch", "6Server-JWS-3.1:mod_cluster-0:1.3.8-2.Final_redhat_2.1.ep7.el6.src", "6Server-JWS-3.1:mod_cluster-tomcat7-0:1.3.8-2.Final_redhat_2.1.ep7.el6.noarch", "6Server-JWS-3.1:mod_cluster-tomcat8-0:1.3.8-2.Final_redhat_2.1.ep7.el6.noarch", "6Server-JWS-3.1:tomcat-native-0:1.2.8-11.redhat_11.ep7.el6.i686", "6Server-JWS-3.1:tomcat-native-0:1.2.8-11.redhat_11.ep7.el6.src", "6Server-JWS-3.1:tomcat-native-0:1.2.8-11.redhat_11.ep7.el6.x86_64", "6Server-JWS-3.1:tomcat-native-debuginfo-0:1.2.8-11.redhat_11.ep7.el6.i686", "6Server-JWS-3.1:tomcat-native-debuginfo-0:1.2.8-11.redhat_11.ep7.el6.x86_64", "6Server-JWS-3.1:tomcat-vault-0:1.1.6-1.Final_redhat_1.1.ep7.el6.noarch", "6Server-JWS-3.1:tomcat-vault-0:1.1.6-1.Final_redhat_1.1.ep7.el6.src", "6Server-JWS-3.1:tomcat-vault-tomcat7-0:1.1.6-1.Final_redhat_1.1.ep7.el6.noarch", "6Server-JWS-3.1:tomcat-vault-tomcat8-0:1.1.6-1.Final_redhat_1.1.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-0:7.0.70-25.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-0:7.0.70-25.ep7.el6.src", "6Server-JWS-3.1:tomcat7-admin-webapps-0:7.0.70-25.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-docs-webapp-0:7.0.70-25.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-el-2.2-api-0:7.0.70-25.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-javadoc-0:7.0.70-25.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-jsp-2.2-api-0:7.0.70-25.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-jsvc-0:7.0.70-25.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-lib-0:7.0.70-25.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-log4j-0:7.0.70-25.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-selinux-0:7.0.70-25.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-servlet-3.0-api-0:7.0.70-25.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-webapps-0:7.0.70-25.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-0:8.0.36-29.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-0:8.0.36-29.ep7.el6.src", "6Server-JWS-3.1:tomcat8-admin-webapps-0:8.0.36-29.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-docs-webapp-0:8.0.36-29.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-el-2.2-api-0:8.0.36-29.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-javadoc-0:8.0.36-29.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-jsp-2.3-api-0:8.0.36-29.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-jsvc-0:8.0.36-29.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-lib-0:8.0.36-29.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-log4j-0:8.0.36-29.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-selinux-0:8.0.36-29.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-servlet-3.1-api-0:8.0.36-29.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-webapps-0:8.0.36-29.ep7.el6.noarch", "7Server-JWS-3.1:mod_cluster-0:1.3.8-2.Final_redhat_2.1.ep7.el7.noarch", "7Server-JWS-3.1:mod_cluster-0:1.3.8-2.Final_redhat_2.1.ep7.el7.src", "7Server-JWS-3.1:mod_cluster-tomcat7-0:1.3.8-2.Final_redhat_2.1.ep7.el7.noarch", "7Server-JWS-3.1:mod_cluster-tomcat8-0:1.3.8-2.Final_redhat_2.1.ep7.el7.noarch", "7Server-JWS-3.1:tomcat-native-0:1.2.8-11.redhat_11.ep7.el7.src", "7Server-JWS-3.1:tomcat-native-0:1.2.8-11.redhat_11.ep7.el7.x86_64", "7Server-JWS-3.1:tomcat-native-debuginfo-0:1.2.8-11.redhat_11.ep7.el7.x86_64", "7Server-JWS-3.1:tomcat-vault-0:1.1.6-1.Final_redhat_1.1.ep7.el7.noarch", "7Server-JWS-3.1:tomcat-vault-0:1.1.6-1.Final_redhat_1.1.ep7.el7.src", "7Server-JWS-3.1:tomcat-vault-tomcat7-0:1.1.6-1.Final_redhat_1.1.ep7.el7.noarch", "7Server-JWS-3.1:tomcat-vault-tomcat8-0:1.1.6-1.Final_redhat_1.1.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-0:7.0.70-25.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-0:7.0.70-25.ep7.el7.src", "7Server-JWS-3.1:tomcat7-admin-webapps-0:7.0.70-25.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-docs-webapp-0:7.0.70-25.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-el-2.2-api-0:7.0.70-25.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-javadoc-0:7.0.70-25.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-jsp-2.2-api-0:7.0.70-25.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-jsvc-0:7.0.70-25.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-lib-0:7.0.70-25.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-log4j-0:7.0.70-25.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-selinux-0:7.0.70-25.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-servlet-3.0-api-0:7.0.70-25.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-webapps-0:7.0.70-25.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-0:8.0.36-29.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-0:8.0.36-29.ep7.el7.src", "7Server-JWS-3.1:tomcat8-admin-webapps-0:8.0.36-29.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-docs-webapp-0:8.0.36-29.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-el-2.2-api-0:8.0.36-29.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-javadoc-0:8.0.36-29.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-jsp-2.3-api-0:8.0.36-29.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-jsvc-0:8.0.36-29.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-lib-0:8.0.36-29.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-log4j-0:8.0.36-29.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-selinux-0:8.0.36-29.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-servlet-3.1-api-0:8.0.36-29.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-webapps-0:8.0.36-29.ep7.el7.noarch" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "tomcat: Late application of security constraints can lead to resource exposure for unauthorised users" } ] }
rhsa-2018_1253
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for apr is now available for Red Hat Enterprise Linux 6.4 Advanced Update Support, Red Hat Enterprise Linux 6.5 Advanced Update Support, Red Hat Enterprise Linux 6.6 Advanced Update Support, Red Hat Enterprise Linux 6.6 Telco Extended Update Support, Red Hat Enterprise Linux 6.7 Extended Update Support, Red Hat Enterprise Linux 7.2 Advanced Update Support, Red Hat Enterprise Linux 7.2 Telco Extended Update Support, Red Hat Enterprise Linux 7.2 Update Services for SAP Solutions, and Red Hat Enterprise Linux 7.3 Extended Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "The Apache Portable Runtime (APR) is a portability library used by the Apache HTTP Server and other projects. It provides a free library of C data structures and routines.\n\nSecurity Fix(es):\n\n* apr: Out-of-bounds array deref in apr_time_exp*() functions (CVE-2017-12613)\n\nFor more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2018:1253", "url": "https://access.redhat.com/errata/RHSA-2018:1253" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "1506523", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1506523" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2018/rhsa-2018_1253.json" } ], "title": "Red Hat Security Advisory: apr security update", "tracking": { "current_release_date": "2024-11-14T21:49:38+00:00", "generator": { "date": "2024-11-14T21:49:38+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2018:1253", "initial_release_date": "2018-04-26T21:03:51+00:00", "revision_history": [ { "date": "2018-04-26T21:03:51+00:00", "number": "1", "summary": "Initial version" }, { "date": "2018-04-26T21:03:51+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-14T21:49:38+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux Server AUS (v. 6.4)", "product": { "name": "Red Hat Enterprise Linux Server AUS (v. 6.4)", "product_id": "6Server-6.4.AUS", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_aus:6.4::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server AUS (v. 6.5)", "product": { "name": "Red Hat Enterprise Linux Server AUS (v. 6.5)", "product_id": "6Server-6.5.AUS", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_aus:6.5::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server AUS (v. 6.6)", "product": { "name": "Red Hat Enterprise Linux Server AUS (v. 6.6)", "product_id": "6Server-6.6.AUS", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_aus:6.6::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server TUS (v. 6.6)", "product": { "name": "Red Hat Enterprise Linux Server TUS (v. 6.6)", "product_id": "6Server-6.6.TUS", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_tus:6.6::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product": { "name": "Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_eus:6.7::computenode" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product": { "name": "Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_eus:6.7::computenode" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server EUS (v. 6.7)", "product": { "name": "Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_eus:6.7::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server AUS (v. 7.2)", "product": { "name": "Red Hat Enterprise Linux Server AUS (v. 7.2)", "product_id": "7Server-7.2.AUS", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_aus:7.2::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server E4S (v. 7.2)", "product": { "name": "Red Hat Enterprise Linux Server E4S (v. 7.2)", "product_id": "7Server-7.2.E4S", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_e4s:7.2::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server TUS (v. 7.2)", "product": { "name": "Red Hat Enterprise Linux Server TUS (v. 7.2)", "product_id": "7Server-7.2.TUS", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_tus:7.2::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)", "product": { "name": "Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)", "product_id": "7ComputeNode-optional-7.3.EUS", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_eus:7.3::computenode" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server EUS (v. 7.3)", "product": { "name": "Red Hat Enterprise Linux Server EUS (v. 7.3)", "product_id": "7Server-7.3.EUS", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_eus:7.3::server" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "apr-debuginfo-0:1.3.9-5.el6_4.1.x86_64", "product": { "name": "apr-debuginfo-0:1.3.9-5.el6_4.1.x86_64", "product_id": "apr-debuginfo-0:1.3.9-5.el6_4.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/apr-debuginfo@1.3.9-5.el6_4.1?arch=x86_64" } } }, { "category": "product_version", "name": "apr-devel-0:1.3.9-5.el6_4.1.x86_64", "product": { "name": "apr-devel-0:1.3.9-5.el6_4.1.x86_64", "product_id": "apr-devel-0:1.3.9-5.el6_4.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/apr-devel@1.3.9-5.el6_4.1?arch=x86_64" } } }, { "category": "product_version", "name": "apr-0:1.3.9-5.el6_4.1.x86_64", "product": { "name": "apr-0:1.3.9-5.el6_4.1.x86_64", "product_id": "apr-0:1.3.9-5.el6_4.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/apr@1.3.9-5.el6_4.1?arch=x86_64" } } }, { "category": "product_version", "name": "apr-0:1.3.9-5.el6_5.1.x86_64", "product": { "name": "apr-0:1.3.9-5.el6_5.1.x86_64", "product_id": "apr-0:1.3.9-5.el6_5.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/apr@1.3.9-5.el6_5.1?arch=x86_64" } } }, { "category": "product_version", "name": "apr-debuginfo-0:1.3.9-5.el6_5.1.x86_64", "product": { "name": "apr-debuginfo-0:1.3.9-5.el6_5.1.x86_64", "product_id": "apr-debuginfo-0:1.3.9-5.el6_5.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/apr-debuginfo@1.3.9-5.el6_5.1?arch=x86_64" } } }, { "category": "product_version", "name": "apr-devel-0:1.3.9-5.el6_5.1.x86_64", "product": { "name": "apr-devel-0:1.3.9-5.el6_5.1.x86_64", "product_id": "apr-devel-0:1.3.9-5.el6_5.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/apr-devel@1.3.9-5.el6_5.1?arch=x86_64" } } }, { "category": "product_version", "name": "apr-devel-0:1.3.9-5.el6_6.1.x86_64", "product": { "name": "apr-devel-0:1.3.9-5.el6_6.1.x86_64", "product_id": "apr-devel-0:1.3.9-5.el6_6.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/apr-devel@1.3.9-5.el6_6.1?arch=x86_64" } } }, { "category": "product_version", "name": "apr-debuginfo-0:1.3.9-5.el6_6.1.x86_64", "product": { "name": "apr-debuginfo-0:1.3.9-5.el6_6.1.x86_64", "product_id": "apr-debuginfo-0:1.3.9-5.el6_6.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/apr-debuginfo@1.3.9-5.el6_6.1?arch=x86_64" } } }, { "category": "product_version", "name": "apr-0:1.3.9-5.el6_6.1.x86_64", "product": { "name": "apr-0:1.3.9-5.el6_6.1.x86_64", "product_id": "apr-0:1.3.9-5.el6_6.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/apr@1.3.9-5.el6_6.1?arch=x86_64" } } }, { "category": "product_version", "name": "apr-0:1.3.9-5.el6_7.1.x86_64", "product": { "name": "apr-0:1.3.9-5.el6_7.1.x86_64", "product_id": "apr-0:1.3.9-5.el6_7.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/apr@1.3.9-5.el6_7.1?arch=x86_64" } } }, { "category": "product_version", "name": "apr-debuginfo-0:1.3.9-5.el6_7.1.x86_64", "product": { "name": "apr-debuginfo-0:1.3.9-5.el6_7.1.x86_64", "product_id": "apr-debuginfo-0:1.3.9-5.el6_7.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/apr-debuginfo@1.3.9-5.el6_7.1?arch=x86_64" } } }, { "category": "product_version", "name": "apr-devel-0:1.3.9-5.el6_7.1.x86_64", "product": { "name": "apr-devel-0:1.3.9-5.el6_7.1.x86_64", "product_id": "apr-devel-0:1.3.9-5.el6_7.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/apr-devel@1.3.9-5.el6_7.1?arch=x86_64" } } }, { "category": "product_version", "name": "apr-devel-0:1.4.8-3.el7_2.1.x86_64", "product": { "name": "apr-devel-0:1.4.8-3.el7_2.1.x86_64", "product_id": "apr-devel-0:1.4.8-3.el7_2.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/apr-devel@1.4.8-3.el7_2.1?arch=x86_64" } } }, { "category": "product_version", "name": "apr-debuginfo-0:1.4.8-3.el7_2.1.x86_64", "product": { "name": "apr-debuginfo-0:1.4.8-3.el7_2.1.x86_64", "product_id": "apr-debuginfo-0:1.4.8-3.el7_2.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/apr-debuginfo@1.4.8-3.el7_2.1?arch=x86_64" } } }, { "category": "product_version", "name": "apr-0:1.4.8-3.el7_2.1.x86_64", "product": { "name": "apr-0:1.4.8-3.el7_2.1.x86_64", "product_id": "apr-0:1.4.8-3.el7_2.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/apr@1.4.8-3.el7_2.1?arch=x86_64" } } }, { "category": "product_version", "name": "apr-0:1.4.8-3.el7_3.1.x86_64", "product": { "name": "apr-0:1.4.8-3.el7_3.1.x86_64", "product_id": "apr-0:1.4.8-3.el7_3.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/apr@1.4.8-3.el7_3.1?arch=x86_64" } } }, { "category": "product_version", "name": "apr-devel-0:1.4.8-3.el7_3.1.x86_64", "product": { "name": "apr-devel-0:1.4.8-3.el7_3.1.x86_64", "product_id": "apr-devel-0:1.4.8-3.el7_3.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/apr-devel@1.4.8-3.el7_3.1?arch=x86_64" } } }, { "category": "product_version", "name": "apr-debuginfo-0:1.4.8-3.el7_3.1.x86_64", "product": { "name": "apr-debuginfo-0:1.4.8-3.el7_3.1.x86_64", "product_id": "apr-debuginfo-0:1.4.8-3.el7_3.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/apr-debuginfo@1.4.8-3.el7_3.1?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "apr-debuginfo-0:1.3.9-5.el6_4.1.i686", "product": { "name": "apr-debuginfo-0:1.3.9-5.el6_4.1.i686", "product_id": "apr-debuginfo-0:1.3.9-5.el6_4.1.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/apr-debuginfo@1.3.9-5.el6_4.1?arch=i686" } } }, { "category": "product_version", "name": "apr-devel-0:1.3.9-5.el6_4.1.i686", "product": { "name": "apr-devel-0:1.3.9-5.el6_4.1.i686", "product_id": "apr-devel-0:1.3.9-5.el6_4.1.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/apr-devel@1.3.9-5.el6_4.1?arch=i686" } } }, { "category": "product_version", "name": "apr-0:1.3.9-5.el6_4.1.i686", "product": { "name": "apr-0:1.3.9-5.el6_4.1.i686", "product_id": "apr-0:1.3.9-5.el6_4.1.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/apr@1.3.9-5.el6_4.1?arch=i686" } } }, { "category": "product_version", "name": "apr-0:1.3.9-5.el6_5.1.i686", "product": { "name": "apr-0:1.3.9-5.el6_5.1.i686", "product_id": "apr-0:1.3.9-5.el6_5.1.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/apr@1.3.9-5.el6_5.1?arch=i686" } } }, { "category": "product_version", "name": "apr-debuginfo-0:1.3.9-5.el6_5.1.i686", "product": { "name": "apr-debuginfo-0:1.3.9-5.el6_5.1.i686", "product_id": "apr-debuginfo-0:1.3.9-5.el6_5.1.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/apr-debuginfo@1.3.9-5.el6_5.1?arch=i686" } } }, { "category": "product_version", "name": "apr-devel-0:1.3.9-5.el6_5.1.i686", "product": { "name": "apr-devel-0:1.3.9-5.el6_5.1.i686", "product_id": "apr-devel-0:1.3.9-5.el6_5.1.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/apr-devel@1.3.9-5.el6_5.1?arch=i686" } } }, { "category": "product_version", "name": "apr-devel-0:1.3.9-5.el6_6.1.i686", "product": { "name": "apr-devel-0:1.3.9-5.el6_6.1.i686", "product_id": "apr-devel-0:1.3.9-5.el6_6.1.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/apr-devel@1.3.9-5.el6_6.1?arch=i686" } } }, { "category": "product_version", "name": "apr-debuginfo-0:1.3.9-5.el6_6.1.i686", "product": { "name": "apr-debuginfo-0:1.3.9-5.el6_6.1.i686", "product_id": "apr-debuginfo-0:1.3.9-5.el6_6.1.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/apr-debuginfo@1.3.9-5.el6_6.1?arch=i686" } } }, { "category": "product_version", "name": "apr-0:1.3.9-5.el6_6.1.i686", "product": { "name": "apr-0:1.3.9-5.el6_6.1.i686", "product_id": "apr-0:1.3.9-5.el6_6.1.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/apr@1.3.9-5.el6_6.1?arch=i686" } } }, { "category": "product_version", "name": "apr-0:1.3.9-5.el6_7.1.i686", "product": { "name": "apr-0:1.3.9-5.el6_7.1.i686", "product_id": "apr-0:1.3.9-5.el6_7.1.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/apr@1.3.9-5.el6_7.1?arch=i686" } } }, { "category": "product_version", "name": "apr-debuginfo-0:1.3.9-5.el6_7.1.i686", "product": { "name": "apr-debuginfo-0:1.3.9-5.el6_7.1.i686", "product_id": "apr-debuginfo-0:1.3.9-5.el6_7.1.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/apr-debuginfo@1.3.9-5.el6_7.1?arch=i686" } } }, { "category": "product_version", "name": "apr-devel-0:1.3.9-5.el6_7.1.i686", "product": { "name": "apr-devel-0:1.3.9-5.el6_7.1.i686", "product_id": "apr-devel-0:1.3.9-5.el6_7.1.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/apr-devel@1.3.9-5.el6_7.1?arch=i686" } } }, { "category": "product_version", "name": "apr-devel-0:1.4.8-3.el7_2.1.i686", "product": { "name": "apr-devel-0:1.4.8-3.el7_2.1.i686", "product_id": "apr-devel-0:1.4.8-3.el7_2.1.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/apr-devel@1.4.8-3.el7_2.1?arch=i686" } } }, { "category": "product_version", "name": "apr-debuginfo-0:1.4.8-3.el7_2.1.i686", "product": { "name": "apr-debuginfo-0:1.4.8-3.el7_2.1.i686", "product_id": "apr-debuginfo-0:1.4.8-3.el7_2.1.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/apr-debuginfo@1.4.8-3.el7_2.1?arch=i686" } } }, { "category": "product_version", "name": "apr-0:1.4.8-3.el7_2.1.i686", "product": { "name": "apr-0:1.4.8-3.el7_2.1.i686", "product_id": "apr-0:1.4.8-3.el7_2.1.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/apr@1.4.8-3.el7_2.1?arch=i686" } } }, { "category": "product_version", "name": "apr-0:1.4.8-3.el7_3.1.i686", "product": { "name": "apr-0:1.4.8-3.el7_3.1.i686", "product_id": "apr-0:1.4.8-3.el7_3.1.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/apr@1.4.8-3.el7_3.1?arch=i686" } } }, { "category": "product_version", "name": "apr-devel-0:1.4.8-3.el7_3.1.i686", "product": { "name": "apr-devel-0:1.4.8-3.el7_3.1.i686", "product_id": "apr-devel-0:1.4.8-3.el7_3.1.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/apr-devel@1.4.8-3.el7_3.1?arch=i686" } } }, { "category": "product_version", "name": "apr-debuginfo-0:1.4.8-3.el7_3.1.i686", "product": { "name": "apr-debuginfo-0:1.4.8-3.el7_3.1.i686", "product_id": "apr-debuginfo-0:1.4.8-3.el7_3.1.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/apr-debuginfo@1.4.8-3.el7_3.1?arch=i686" } } } ], "category": "architecture", "name": "i686" }, { "branches": [ { "category": "product_version", "name": "apr-0:1.3.9-5.el6_4.1.src", "product": { "name": "apr-0:1.3.9-5.el6_4.1.src", "product_id": "apr-0:1.3.9-5.el6_4.1.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/apr@1.3.9-5.el6_4.1?arch=src" } } }, { "category": "product_version", "name": "apr-0:1.3.9-5.el6_5.1.src", "product": { "name": "apr-0:1.3.9-5.el6_5.1.src", "product_id": "apr-0:1.3.9-5.el6_5.1.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/apr@1.3.9-5.el6_5.1?arch=src" } } }, { "category": "product_version", "name": "apr-0:1.3.9-5.el6_6.1.src", "product": { "name": "apr-0:1.3.9-5.el6_6.1.src", "product_id": "apr-0:1.3.9-5.el6_6.1.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/apr@1.3.9-5.el6_6.1?arch=src" } } }, { "category": "product_version", "name": "apr-0:1.3.9-5.el6_7.1.src", "product": { "name": "apr-0:1.3.9-5.el6_7.1.src", "product_id": "apr-0:1.3.9-5.el6_7.1.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/apr@1.3.9-5.el6_7.1?arch=src" } } }, { "category": "product_version", "name": "apr-0:1.4.8-3.el7_2.1.src", "product": { "name": "apr-0:1.4.8-3.el7_2.1.src", "product_id": "apr-0:1.4.8-3.el7_2.1.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/apr@1.4.8-3.el7_2.1?arch=src" } } }, { "category": "product_version", "name": "apr-0:1.4.8-3.el7_3.1.src", "product": { "name": "apr-0:1.4.8-3.el7_3.1.src", "product_id": "apr-0:1.4.8-3.el7_3.1.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/apr@1.4.8-3.el7_3.1?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "apr-0:1.3.9-5.el6_7.1.ppc", "product": { "name": "apr-0:1.3.9-5.el6_7.1.ppc", "product_id": "apr-0:1.3.9-5.el6_7.1.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/apr@1.3.9-5.el6_7.1?arch=ppc" } } }, { "category": "product_version", "name": "apr-devel-0:1.3.9-5.el6_7.1.ppc", "product": { "name": "apr-devel-0:1.3.9-5.el6_7.1.ppc", "product_id": "apr-devel-0:1.3.9-5.el6_7.1.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/apr-devel@1.3.9-5.el6_7.1?arch=ppc" } } }, { "category": "product_version", "name": "apr-debuginfo-0:1.3.9-5.el6_7.1.ppc", "product": { "name": "apr-debuginfo-0:1.3.9-5.el6_7.1.ppc", "product_id": "apr-debuginfo-0:1.3.9-5.el6_7.1.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/apr-debuginfo@1.3.9-5.el6_7.1?arch=ppc" } } }, { "category": "product_version", "name": "apr-0:1.4.8-3.el7_3.1.ppc", "product": { "name": "apr-0:1.4.8-3.el7_3.1.ppc", "product_id": "apr-0:1.4.8-3.el7_3.1.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/apr@1.4.8-3.el7_3.1?arch=ppc" } } }, { "category": "product_version", "name": "apr-devel-0:1.4.8-3.el7_3.1.ppc", "product": { "name": "apr-devel-0:1.4.8-3.el7_3.1.ppc", "product_id": "apr-devel-0:1.4.8-3.el7_3.1.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/apr-devel@1.4.8-3.el7_3.1?arch=ppc" } } }, { "category": "product_version", "name": "apr-debuginfo-0:1.4.8-3.el7_3.1.ppc", "product": { "name": "apr-debuginfo-0:1.4.8-3.el7_3.1.ppc", "product_id": "apr-debuginfo-0:1.4.8-3.el7_3.1.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/apr-debuginfo@1.4.8-3.el7_3.1?arch=ppc" } } } ], "category": "architecture", "name": "ppc" }, { "branches": [ { "category": "product_version", "name": "apr-0:1.3.9-5.el6_7.1.ppc64", "product": { "name": "apr-0:1.3.9-5.el6_7.1.ppc64", "product_id": "apr-0:1.3.9-5.el6_7.1.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/apr@1.3.9-5.el6_7.1?arch=ppc64" } } }, { "category": "product_version", "name": "apr-devel-0:1.3.9-5.el6_7.1.ppc64", "product": { "name": "apr-devel-0:1.3.9-5.el6_7.1.ppc64", "product_id": "apr-devel-0:1.3.9-5.el6_7.1.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/apr-devel@1.3.9-5.el6_7.1?arch=ppc64" } } }, { "category": "product_version", "name": "apr-debuginfo-0:1.3.9-5.el6_7.1.ppc64", "product": { "name": "apr-debuginfo-0:1.3.9-5.el6_7.1.ppc64", "product_id": "apr-debuginfo-0:1.3.9-5.el6_7.1.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/apr-debuginfo@1.3.9-5.el6_7.1?arch=ppc64" } } }, { "category": "product_version", "name": "apr-0:1.4.8-3.el7_3.1.ppc64", "product": { "name": "apr-0:1.4.8-3.el7_3.1.ppc64", "product_id": "apr-0:1.4.8-3.el7_3.1.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/apr@1.4.8-3.el7_3.1?arch=ppc64" } } }, { "category": "product_version", "name": "apr-devel-0:1.4.8-3.el7_3.1.ppc64", "product": { "name": "apr-devel-0:1.4.8-3.el7_3.1.ppc64", "product_id": "apr-devel-0:1.4.8-3.el7_3.1.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/apr-devel@1.4.8-3.el7_3.1?arch=ppc64" } } }, { "category": "product_version", "name": "apr-debuginfo-0:1.4.8-3.el7_3.1.ppc64", "product": { "name": "apr-debuginfo-0:1.4.8-3.el7_3.1.ppc64", "product_id": "apr-debuginfo-0:1.4.8-3.el7_3.1.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/apr-debuginfo@1.4.8-3.el7_3.1?arch=ppc64" } } } ], "category": "architecture", "name": "ppc64" }, { "branches": [ { "category": "product_version", "name": "apr-0:1.3.9-5.el6_7.1.s390", "product": { "name": "apr-0:1.3.9-5.el6_7.1.s390", "product_id": "apr-0:1.3.9-5.el6_7.1.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/apr@1.3.9-5.el6_7.1?arch=s390" } } }, { "category": "product_version", "name": "apr-devel-0:1.3.9-5.el6_7.1.s390", "product": { "name": "apr-devel-0:1.3.9-5.el6_7.1.s390", "product_id": "apr-devel-0:1.3.9-5.el6_7.1.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/apr-devel@1.3.9-5.el6_7.1?arch=s390" } } }, { "category": "product_version", "name": "apr-debuginfo-0:1.3.9-5.el6_7.1.s390", "product": { "name": "apr-debuginfo-0:1.3.9-5.el6_7.1.s390", "product_id": "apr-debuginfo-0:1.3.9-5.el6_7.1.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/apr-debuginfo@1.3.9-5.el6_7.1?arch=s390" } } }, { "category": "product_version", "name": "apr-0:1.4.8-3.el7_3.1.s390", "product": { "name": "apr-0:1.4.8-3.el7_3.1.s390", "product_id": "apr-0:1.4.8-3.el7_3.1.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/apr@1.4.8-3.el7_3.1?arch=s390" } } }, { "category": "product_version", "name": "apr-devel-0:1.4.8-3.el7_3.1.s390", "product": { "name": "apr-devel-0:1.4.8-3.el7_3.1.s390", "product_id": "apr-devel-0:1.4.8-3.el7_3.1.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/apr-devel@1.4.8-3.el7_3.1?arch=s390" } } }, { "category": "product_version", "name": "apr-debuginfo-0:1.4.8-3.el7_3.1.s390", "product": { "name": "apr-debuginfo-0:1.4.8-3.el7_3.1.s390", "product_id": "apr-debuginfo-0:1.4.8-3.el7_3.1.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/apr-debuginfo@1.4.8-3.el7_3.1?arch=s390" } } } ], "category": "architecture", "name": "s390" }, { "branches": [ { "category": "product_version", "name": "apr-0:1.3.9-5.el6_7.1.s390x", "product": { "name": "apr-0:1.3.9-5.el6_7.1.s390x", "product_id": "apr-0:1.3.9-5.el6_7.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/apr@1.3.9-5.el6_7.1?arch=s390x" } } }, { "category": "product_version", "name": "apr-devel-0:1.3.9-5.el6_7.1.s390x", "product": { "name": "apr-devel-0:1.3.9-5.el6_7.1.s390x", "product_id": "apr-devel-0:1.3.9-5.el6_7.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/apr-devel@1.3.9-5.el6_7.1?arch=s390x" } } }, { "category": "product_version", "name": "apr-debuginfo-0:1.3.9-5.el6_7.1.s390x", "product": { "name": "apr-debuginfo-0:1.3.9-5.el6_7.1.s390x", "product_id": "apr-debuginfo-0:1.3.9-5.el6_7.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/apr-debuginfo@1.3.9-5.el6_7.1?arch=s390x" } } }, { "category": "product_version", "name": "apr-0:1.4.8-3.el7_3.1.s390x", "product": { "name": "apr-0:1.4.8-3.el7_3.1.s390x", "product_id": "apr-0:1.4.8-3.el7_3.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/apr@1.4.8-3.el7_3.1?arch=s390x" } } }, { "category": "product_version", "name": "apr-devel-0:1.4.8-3.el7_3.1.s390x", "product": { "name": "apr-devel-0:1.4.8-3.el7_3.1.s390x", "product_id": "apr-devel-0:1.4.8-3.el7_3.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/apr-devel@1.4.8-3.el7_3.1?arch=s390x" } } }, { "category": "product_version", "name": "apr-debuginfo-0:1.4.8-3.el7_3.1.s390x", "product": { "name": "apr-debuginfo-0:1.4.8-3.el7_3.1.s390x", "product_id": "apr-debuginfo-0:1.4.8-3.el7_3.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/apr-debuginfo@1.4.8-3.el7_3.1?arch=s390x" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "apr-0:1.4.8-3.el7_3.1.ppc64le", "product": { "name": "apr-0:1.4.8-3.el7_3.1.ppc64le", "product_id": "apr-0:1.4.8-3.el7_3.1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/apr@1.4.8-3.el7_3.1?arch=ppc64le" } } }, { "category": "product_version", "name": "apr-devel-0:1.4.8-3.el7_3.1.ppc64le", "product": { "name": "apr-devel-0:1.4.8-3.el7_3.1.ppc64le", "product_id": "apr-devel-0:1.4.8-3.el7_3.1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/apr-devel@1.4.8-3.el7_3.1?arch=ppc64le" } } }, { "category": "product_version", "name": "apr-debuginfo-0:1.4.8-3.el7_3.1.ppc64le", "product": { "name": "apr-debuginfo-0:1.4.8-3.el7_3.1.ppc64le", "product_id": "apr-debuginfo-0:1.4.8-3.el7_3.1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/apr-debuginfo@1.4.8-3.el7_3.1?arch=ppc64le" } } } ], "category": "architecture", "name": "ppc64le" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "apr-0:1.3.9-5.el6_7.1.i686 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:apr-0:1.3.9-5.el6_7.1.i686" }, "product_reference": "apr-0:1.3.9-5.el6_7.1.i686", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "apr-0:1.3.9-5.el6_7.1.ppc as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:apr-0:1.3.9-5.el6_7.1.ppc" }, "product_reference": "apr-0:1.3.9-5.el6_7.1.ppc", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "apr-0:1.3.9-5.el6_7.1.ppc64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:apr-0:1.3.9-5.el6_7.1.ppc64" }, "product_reference": "apr-0:1.3.9-5.el6_7.1.ppc64", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "apr-0:1.3.9-5.el6_7.1.s390 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:apr-0:1.3.9-5.el6_7.1.s390" }, "product_reference": "apr-0:1.3.9-5.el6_7.1.s390", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "apr-0:1.3.9-5.el6_7.1.s390x as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:apr-0:1.3.9-5.el6_7.1.s390x" }, "product_reference": "apr-0:1.3.9-5.el6_7.1.s390x", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "apr-0:1.3.9-5.el6_7.1.src as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:apr-0:1.3.9-5.el6_7.1.src" }, "product_reference": "apr-0:1.3.9-5.el6_7.1.src", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "apr-0:1.3.9-5.el6_7.1.x86_64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:apr-0:1.3.9-5.el6_7.1.x86_64" }, "product_reference": "apr-0:1.3.9-5.el6_7.1.x86_64", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "apr-debuginfo-0:1.3.9-5.el6_7.1.i686 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:apr-debuginfo-0:1.3.9-5.el6_7.1.i686" }, "product_reference": "apr-debuginfo-0:1.3.9-5.el6_7.1.i686", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "apr-debuginfo-0:1.3.9-5.el6_7.1.ppc as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:apr-debuginfo-0:1.3.9-5.el6_7.1.ppc" }, "product_reference": "apr-debuginfo-0:1.3.9-5.el6_7.1.ppc", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "apr-debuginfo-0:1.3.9-5.el6_7.1.ppc64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:apr-debuginfo-0:1.3.9-5.el6_7.1.ppc64" }, "product_reference": "apr-debuginfo-0:1.3.9-5.el6_7.1.ppc64", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "apr-debuginfo-0:1.3.9-5.el6_7.1.s390 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:apr-debuginfo-0:1.3.9-5.el6_7.1.s390" }, "product_reference": "apr-debuginfo-0:1.3.9-5.el6_7.1.s390", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "apr-debuginfo-0:1.3.9-5.el6_7.1.s390x as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:apr-debuginfo-0:1.3.9-5.el6_7.1.s390x" }, "product_reference": "apr-debuginfo-0:1.3.9-5.el6_7.1.s390x", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "apr-debuginfo-0:1.3.9-5.el6_7.1.x86_64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:apr-debuginfo-0:1.3.9-5.el6_7.1.x86_64" }, "product_reference": "apr-debuginfo-0:1.3.9-5.el6_7.1.x86_64", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "apr-devel-0:1.3.9-5.el6_7.1.i686 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:apr-devel-0:1.3.9-5.el6_7.1.i686" }, "product_reference": "apr-devel-0:1.3.9-5.el6_7.1.i686", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "apr-devel-0:1.3.9-5.el6_7.1.ppc as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:apr-devel-0:1.3.9-5.el6_7.1.ppc" }, "product_reference": "apr-devel-0:1.3.9-5.el6_7.1.ppc", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "apr-devel-0:1.3.9-5.el6_7.1.ppc64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:apr-devel-0:1.3.9-5.el6_7.1.ppc64" }, "product_reference": "apr-devel-0:1.3.9-5.el6_7.1.ppc64", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "apr-devel-0:1.3.9-5.el6_7.1.s390 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:apr-devel-0:1.3.9-5.el6_7.1.s390" }, "product_reference": "apr-devel-0:1.3.9-5.el6_7.1.s390", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "apr-devel-0:1.3.9-5.el6_7.1.s390x as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:apr-devel-0:1.3.9-5.el6_7.1.s390x" }, "product_reference": "apr-devel-0:1.3.9-5.el6_7.1.s390x", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "apr-devel-0:1.3.9-5.el6_7.1.x86_64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:apr-devel-0:1.3.9-5.el6_7.1.x86_64" }, "product_reference": "apr-devel-0:1.3.9-5.el6_7.1.x86_64", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "apr-0:1.3.9-5.el6_7.1.i686 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:apr-0:1.3.9-5.el6_7.1.i686" }, "product_reference": "apr-0:1.3.9-5.el6_7.1.i686", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "apr-0:1.3.9-5.el6_7.1.ppc as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:apr-0:1.3.9-5.el6_7.1.ppc" }, "product_reference": "apr-0:1.3.9-5.el6_7.1.ppc", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "apr-0:1.3.9-5.el6_7.1.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:apr-0:1.3.9-5.el6_7.1.ppc64" }, "product_reference": "apr-0:1.3.9-5.el6_7.1.ppc64", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "apr-0:1.3.9-5.el6_7.1.s390 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:apr-0:1.3.9-5.el6_7.1.s390" }, "product_reference": "apr-0:1.3.9-5.el6_7.1.s390", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "apr-0:1.3.9-5.el6_7.1.s390x as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:apr-0:1.3.9-5.el6_7.1.s390x" }, "product_reference": "apr-0:1.3.9-5.el6_7.1.s390x", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "apr-0:1.3.9-5.el6_7.1.src as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:apr-0:1.3.9-5.el6_7.1.src" }, "product_reference": "apr-0:1.3.9-5.el6_7.1.src", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "apr-0:1.3.9-5.el6_7.1.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:apr-0:1.3.9-5.el6_7.1.x86_64" }, "product_reference": "apr-0:1.3.9-5.el6_7.1.x86_64", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "apr-debuginfo-0:1.3.9-5.el6_7.1.i686 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:apr-debuginfo-0:1.3.9-5.el6_7.1.i686" }, "product_reference": "apr-debuginfo-0:1.3.9-5.el6_7.1.i686", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "apr-debuginfo-0:1.3.9-5.el6_7.1.ppc as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:apr-debuginfo-0:1.3.9-5.el6_7.1.ppc" }, "product_reference": "apr-debuginfo-0:1.3.9-5.el6_7.1.ppc", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "apr-debuginfo-0:1.3.9-5.el6_7.1.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:apr-debuginfo-0:1.3.9-5.el6_7.1.ppc64" }, "product_reference": "apr-debuginfo-0:1.3.9-5.el6_7.1.ppc64", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "apr-debuginfo-0:1.3.9-5.el6_7.1.s390 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:apr-debuginfo-0:1.3.9-5.el6_7.1.s390" }, "product_reference": "apr-debuginfo-0:1.3.9-5.el6_7.1.s390", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "apr-debuginfo-0:1.3.9-5.el6_7.1.s390x as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:apr-debuginfo-0:1.3.9-5.el6_7.1.s390x" }, "product_reference": "apr-debuginfo-0:1.3.9-5.el6_7.1.s390x", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "apr-debuginfo-0:1.3.9-5.el6_7.1.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:apr-debuginfo-0:1.3.9-5.el6_7.1.x86_64" }, "product_reference": "apr-debuginfo-0:1.3.9-5.el6_7.1.x86_64", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "apr-devel-0:1.3.9-5.el6_7.1.i686 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:apr-devel-0:1.3.9-5.el6_7.1.i686" }, "product_reference": "apr-devel-0:1.3.9-5.el6_7.1.i686", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "apr-devel-0:1.3.9-5.el6_7.1.ppc as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:apr-devel-0:1.3.9-5.el6_7.1.ppc" }, "product_reference": "apr-devel-0:1.3.9-5.el6_7.1.ppc", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "apr-devel-0:1.3.9-5.el6_7.1.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:apr-devel-0:1.3.9-5.el6_7.1.ppc64" }, "product_reference": "apr-devel-0:1.3.9-5.el6_7.1.ppc64", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "apr-devel-0:1.3.9-5.el6_7.1.s390 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:apr-devel-0:1.3.9-5.el6_7.1.s390" }, "product_reference": "apr-devel-0:1.3.9-5.el6_7.1.s390", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "apr-devel-0:1.3.9-5.el6_7.1.s390x as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:apr-devel-0:1.3.9-5.el6_7.1.s390x" }, "product_reference": "apr-devel-0:1.3.9-5.el6_7.1.s390x", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "apr-devel-0:1.3.9-5.el6_7.1.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:apr-devel-0:1.3.9-5.el6_7.1.x86_64" }, "product_reference": "apr-devel-0:1.3.9-5.el6_7.1.x86_64", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "apr-0:1.3.9-5.el6_4.1.i686 as a component of Red Hat Enterprise Linux Server AUS (v. 6.4)", "product_id": "6Server-6.4.AUS:apr-0:1.3.9-5.el6_4.1.i686" }, "product_reference": "apr-0:1.3.9-5.el6_4.1.i686", "relates_to_product_reference": "6Server-6.4.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "apr-0:1.3.9-5.el6_4.1.src as a component of Red Hat Enterprise Linux Server AUS (v. 6.4)", "product_id": "6Server-6.4.AUS:apr-0:1.3.9-5.el6_4.1.src" }, "product_reference": "apr-0:1.3.9-5.el6_4.1.src", "relates_to_product_reference": "6Server-6.4.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "apr-0:1.3.9-5.el6_4.1.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.4)", "product_id": "6Server-6.4.AUS:apr-0:1.3.9-5.el6_4.1.x86_64" }, "product_reference": "apr-0:1.3.9-5.el6_4.1.x86_64", "relates_to_product_reference": "6Server-6.4.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "apr-debuginfo-0:1.3.9-5.el6_4.1.i686 as a component of Red Hat Enterprise Linux Server AUS (v. 6.4)", "product_id": "6Server-6.4.AUS:apr-debuginfo-0:1.3.9-5.el6_4.1.i686" }, "product_reference": "apr-debuginfo-0:1.3.9-5.el6_4.1.i686", "relates_to_product_reference": "6Server-6.4.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "apr-debuginfo-0:1.3.9-5.el6_4.1.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.4)", "product_id": "6Server-6.4.AUS:apr-debuginfo-0:1.3.9-5.el6_4.1.x86_64" }, "product_reference": "apr-debuginfo-0:1.3.9-5.el6_4.1.x86_64", "relates_to_product_reference": "6Server-6.4.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "apr-devel-0:1.3.9-5.el6_4.1.i686 as a component of Red Hat Enterprise Linux Server AUS (v. 6.4)", "product_id": "6Server-6.4.AUS:apr-devel-0:1.3.9-5.el6_4.1.i686" }, "product_reference": "apr-devel-0:1.3.9-5.el6_4.1.i686", "relates_to_product_reference": "6Server-6.4.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "apr-devel-0:1.3.9-5.el6_4.1.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.4)", "product_id": "6Server-6.4.AUS:apr-devel-0:1.3.9-5.el6_4.1.x86_64" }, "product_reference": "apr-devel-0:1.3.9-5.el6_4.1.x86_64", "relates_to_product_reference": "6Server-6.4.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "apr-0:1.3.9-5.el6_5.1.i686 as a component of Red Hat Enterprise Linux Server AUS (v. 6.5)", "product_id": "6Server-6.5.AUS:apr-0:1.3.9-5.el6_5.1.i686" }, "product_reference": "apr-0:1.3.9-5.el6_5.1.i686", "relates_to_product_reference": "6Server-6.5.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "apr-0:1.3.9-5.el6_5.1.src as a component of Red Hat Enterprise Linux Server AUS (v. 6.5)", "product_id": "6Server-6.5.AUS:apr-0:1.3.9-5.el6_5.1.src" }, "product_reference": "apr-0:1.3.9-5.el6_5.1.src", "relates_to_product_reference": "6Server-6.5.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "apr-0:1.3.9-5.el6_5.1.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.5)", "product_id": "6Server-6.5.AUS:apr-0:1.3.9-5.el6_5.1.x86_64" }, "product_reference": "apr-0:1.3.9-5.el6_5.1.x86_64", "relates_to_product_reference": "6Server-6.5.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "apr-debuginfo-0:1.3.9-5.el6_5.1.i686 as a component of Red Hat Enterprise Linux Server AUS (v. 6.5)", "product_id": "6Server-6.5.AUS:apr-debuginfo-0:1.3.9-5.el6_5.1.i686" }, "product_reference": "apr-debuginfo-0:1.3.9-5.el6_5.1.i686", "relates_to_product_reference": "6Server-6.5.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "apr-debuginfo-0:1.3.9-5.el6_5.1.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.5)", "product_id": "6Server-6.5.AUS:apr-debuginfo-0:1.3.9-5.el6_5.1.x86_64" }, "product_reference": "apr-debuginfo-0:1.3.9-5.el6_5.1.x86_64", "relates_to_product_reference": "6Server-6.5.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "apr-devel-0:1.3.9-5.el6_5.1.i686 as a component of Red Hat Enterprise Linux Server AUS (v. 6.5)", "product_id": "6Server-6.5.AUS:apr-devel-0:1.3.9-5.el6_5.1.i686" }, "product_reference": "apr-devel-0:1.3.9-5.el6_5.1.i686", "relates_to_product_reference": "6Server-6.5.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "apr-devel-0:1.3.9-5.el6_5.1.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.5)", "product_id": "6Server-6.5.AUS:apr-devel-0:1.3.9-5.el6_5.1.x86_64" }, "product_reference": "apr-devel-0:1.3.9-5.el6_5.1.x86_64", "relates_to_product_reference": "6Server-6.5.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "apr-0:1.3.9-5.el6_6.1.i686 as a component of Red Hat Enterprise Linux Server AUS (v. 6.6)", "product_id": "6Server-6.6.AUS:apr-0:1.3.9-5.el6_6.1.i686" }, "product_reference": "apr-0:1.3.9-5.el6_6.1.i686", "relates_to_product_reference": "6Server-6.6.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "apr-0:1.3.9-5.el6_6.1.src as a component of Red Hat Enterprise Linux Server AUS (v. 6.6)", "product_id": "6Server-6.6.AUS:apr-0:1.3.9-5.el6_6.1.src" }, "product_reference": "apr-0:1.3.9-5.el6_6.1.src", "relates_to_product_reference": "6Server-6.6.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "apr-0:1.3.9-5.el6_6.1.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.6)", "product_id": "6Server-6.6.AUS:apr-0:1.3.9-5.el6_6.1.x86_64" }, "product_reference": "apr-0:1.3.9-5.el6_6.1.x86_64", "relates_to_product_reference": "6Server-6.6.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "apr-debuginfo-0:1.3.9-5.el6_6.1.i686 as a component of Red Hat Enterprise Linux Server AUS (v. 6.6)", "product_id": "6Server-6.6.AUS:apr-debuginfo-0:1.3.9-5.el6_6.1.i686" }, "product_reference": "apr-debuginfo-0:1.3.9-5.el6_6.1.i686", "relates_to_product_reference": "6Server-6.6.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "apr-debuginfo-0:1.3.9-5.el6_6.1.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.6)", "product_id": "6Server-6.6.AUS:apr-debuginfo-0:1.3.9-5.el6_6.1.x86_64" }, "product_reference": "apr-debuginfo-0:1.3.9-5.el6_6.1.x86_64", "relates_to_product_reference": "6Server-6.6.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "apr-devel-0:1.3.9-5.el6_6.1.i686 as a component of Red Hat Enterprise Linux Server AUS (v. 6.6)", "product_id": "6Server-6.6.AUS:apr-devel-0:1.3.9-5.el6_6.1.i686" }, "product_reference": "apr-devel-0:1.3.9-5.el6_6.1.i686", "relates_to_product_reference": "6Server-6.6.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "apr-devel-0:1.3.9-5.el6_6.1.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.6)", "product_id": "6Server-6.6.AUS:apr-devel-0:1.3.9-5.el6_6.1.x86_64" }, "product_reference": "apr-devel-0:1.3.9-5.el6_6.1.x86_64", "relates_to_product_reference": "6Server-6.6.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "apr-0:1.3.9-5.el6_6.1.i686 as a component of Red Hat Enterprise Linux Server TUS (v. 6.6)", "product_id": "6Server-6.6.TUS:apr-0:1.3.9-5.el6_6.1.i686" }, "product_reference": "apr-0:1.3.9-5.el6_6.1.i686", "relates_to_product_reference": "6Server-6.6.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "apr-0:1.3.9-5.el6_6.1.src as a component of Red Hat Enterprise Linux Server TUS (v. 6.6)", "product_id": "6Server-6.6.TUS:apr-0:1.3.9-5.el6_6.1.src" }, "product_reference": "apr-0:1.3.9-5.el6_6.1.src", "relates_to_product_reference": "6Server-6.6.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "apr-0:1.3.9-5.el6_6.1.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 6.6)", "product_id": "6Server-6.6.TUS:apr-0:1.3.9-5.el6_6.1.x86_64" }, "product_reference": "apr-0:1.3.9-5.el6_6.1.x86_64", "relates_to_product_reference": "6Server-6.6.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "apr-debuginfo-0:1.3.9-5.el6_6.1.i686 as a component of Red Hat Enterprise Linux Server TUS (v. 6.6)", "product_id": "6Server-6.6.TUS:apr-debuginfo-0:1.3.9-5.el6_6.1.i686" }, "product_reference": "apr-debuginfo-0:1.3.9-5.el6_6.1.i686", "relates_to_product_reference": "6Server-6.6.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "apr-debuginfo-0:1.3.9-5.el6_6.1.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 6.6)", "product_id": "6Server-6.6.TUS:apr-debuginfo-0:1.3.9-5.el6_6.1.x86_64" }, "product_reference": "apr-debuginfo-0:1.3.9-5.el6_6.1.x86_64", "relates_to_product_reference": "6Server-6.6.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "apr-devel-0:1.3.9-5.el6_6.1.i686 as a component of Red Hat Enterprise Linux Server TUS (v. 6.6)", "product_id": "6Server-6.6.TUS:apr-devel-0:1.3.9-5.el6_6.1.i686" }, "product_reference": "apr-devel-0:1.3.9-5.el6_6.1.i686", "relates_to_product_reference": "6Server-6.6.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "apr-devel-0:1.3.9-5.el6_6.1.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 6.6)", "product_id": "6Server-6.6.TUS:apr-devel-0:1.3.9-5.el6_6.1.x86_64" }, "product_reference": "apr-devel-0:1.3.9-5.el6_6.1.x86_64", "relates_to_product_reference": "6Server-6.6.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "apr-0:1.3.9-5.el6_7.1.i686 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:apr-0:1.3.9-5.el6_7.1.i686" }, "product_reference": "apr-0:1.3.9-5.el6_7.1.i686", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "apr-0:1.3.9-5.el6_7.1.ppc as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:apr-0:1.3.9-5.el6_7.1.ppc" }, "product_reference": "apr-0:1.3.9-5.el6_7.1.ppc", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "apr-0:1.3.9-5.el6_7.1.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:apr-0:1.3.9-5.el6_7.1.ppc64" }, "product_reference": "apr-0:1.3.9-5.el6_7.1.ppc64", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "apr-0:1.3.9-5.el6_7.1.s390 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:apr-0:1.3.9-5.el6_7.1.s390" }, "product_reference": "apr-0:1.3.9-5.el6_7.1.s390", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "apr-0:1.3.9-5.el6_7.1.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:apr-0:1.3.9-5.el6_7.1.s390x" }, "product_reference": "apr-0:1.3.9-5.el6_7.1.s390x", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "apr-0:1.3.9-5.el6_7.1.src as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:apr-0:1.3.9-5.el6_7.1.src" }, "product_reference": "apr-0:1.3.9-5.el6_7.1.src", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "apr-0:1.3.9-5.el6_7.1.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:apr-0:1.3.9-5.el6_7.1.x86_64" }, "product_reference": "apr-0:1.3.9-5.el6_7.1.x86_64", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "apr-debuginfo-0:1.3.9-5.el6_7.1.i686 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:apr-debuginfo-0:1.3.9-5.el6_7.1.i686" }, "product_reference": "apr-debuginfo-0:1.3.9-5.el6_7.1.i686", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "apr-debuginfo-0:1.3.9-5.el6_7.1.ppc as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:apr-debuginfo-0:1.3.9-5.el6_7.1.ppc" }, "product_reference": "apr-debuginfo-0:1.3.9-5.el6_7.1.ppc", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "apr-debuginfo-0:1.3.9-5.el6_7.1.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:apr-debuginfo-0:1.3.9-5.el6_7.1.ppc64" }, "product_reference": "apr-debuginfo-0:1.3.9-5.el6_7.1.ppc64", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "apr-debuginfo-0:1.3.9-5.el6_7.1.s390 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:apr-debuginfo-0:1.3.9-5.el6_7.1.s390" }, "product_reference": "apr-debuginfo-0:1.3.9-5.el6_7.1.s390", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "apr-debuginfo-0:1.3.9-5.el6_7.1.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:apr-debuginfo-0:1.3.9-5.el6_7.1.s390x" }, "product_reference": "apr-debuginfo-0:1.3.9-5.el6_7.1.s390x", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "apr-debuginfo-0:1.3.9-5.el6_7.1.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:apr-debuginfo-0:1.3.9-5.el6_7.1.x86_64" }, "product_reference": "apr-debuginfo-0:1.3.9-5.el6_7.1.x86_64", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "apr-devel-0:1.3.9-5.el6_7.1.i686 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:apr-devel-0:1.3.9-5.el6_7.1.i686" }, "product_reference": "apr-devel-0:1.3.9-5.el6_7.1.i686", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "apr-devel-0:1.3.9-5.el6_7.1.ppc as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:apr-devel-0:1.3.9-5.el6_7.1.ppc" }, "product_reference": "apr-devel-0:1.3.9-5.el6_7.1.ppc", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "apr-devel-0:1.3.9-5.el6_7.1.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:apr-devel-0:1.3.9-5.el6_7.1.ppc64" }, "product_reference": "apr-devel-0:1.3.9-5.el6_7.1.ppc64", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "apr-devel-0:1.3.9-5.el6_7.1.s390 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:apr-devel-0:1.3.9-5.el6_7.1.s390" }, "product_reference": "apr-devel-0:1.3.9-5.el6_7.1.s390", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "apr-devel-0:1.3.9-5.el6_7.1.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:apr-devel-0:1.3.9-5.el6_7.1.s390x" }, "product_reference": "apr-devel-0:1.3.9-5.el6_7.1.s390x", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "apr-devel-0:1.3.9-5.el6_7.1.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:apr-devel-0:1.3.9-5.el6_7.1.x86_64" }, "product_reference": "apr-devel-0:1.3.9-5.el6_7.1.x86_64", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "apr-0:1.4.8-3.el7_3.1.i686 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)", "product_id": "7ComputeNode-optional-7.3.EUS:apr-0:1.4.8-3.el7_3.1.i686" }, "product_reference": "apr-0:1.4.8-3.el7_3.1.i686", "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "apr-0:1.4.8-3.el7_3.1.ppc as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)", "product_id": "7ComputeNode-optional-7.3.EUS:apr-0:1.4.8-3.el7_3.1.ppc" }, "product_reference": "apr-0:1.4.8-3.el7_3.1.ppc", "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "apr-0:1.4.8-3.el7_3.1.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)", "product_id": "7ComputeNode-optional-7.3.EUS:apr-0:1.4.8-3.el7_3.1.ppc64" }, "product_reference": "apr-0:1.4.8-3.el7_3.1.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "apr-0:1.4.8-3.el7_3.1.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)", "product_id": "7ComputeNode-optional-7.3.EUS:apr-0:1.4.8-3.el7_3.1.ppc64le" }, "product_reference": "apr-0:1.4.8-3.el7_3.1.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "apr-0:1.4.8-3.el7_3.1.s390 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)", "product_id": "7ComputeNode-optional-7.3.EUS:apr-0:1.4.8-3.el7_3.1.s390" }, "product_reference": "apr-0:1.4.8-3.el7_3.1.s390", "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "apr-0:1.4.8-3.el7_3.1.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)", "product_id": "7ComputeNode-optional-7.3.EUS:apr-0:1.4.8-3.el7_3.1.s390x" }, "product_reference": "apr-0:1.4.8-3.el7_3.1.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "apr-0:1.4.8-3.el7_3.1.src as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)", "product_id": "7ComputeNode-optional-7.3.EUS:apr-0:1.4.8-3.el7_3.1.src" }, "product_reference": "apr-0:1.4.8-3.el7_3.1.src", "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "apr-0:1.4.8-3.el7_3.1.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)", "product_id": "7ComputeNode-optional-7.3.EUS:apr-0:1.4.8-3.el7_3.1.x86_64" }, "product_reference": "apr-0:1.4.8-3.el7_3.1.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "apr-debuginfo-0:1.4.8-3.el7_3.1.i686 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)", "product_id": "7ComputeNode-optional-7.3.EUS:apr-debuginfo-0:1.4.8-3.el7_3.1.i686" }, "product_reference": "apr-debuginfo-0:1.4.8-3.el7_3.1.i686", "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "apr-debuginfo-0:1.4.8-3.el7_3.1.ppc as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)", "product_id": "7ComputeNode-optional-7.3.EUS:apr-debuginfo-0:1.4.8-3.el7_3.1.ppc" }, "product_reference": "apr-debuginfo-0:1.4.8-3.el7_3.1.ppc", "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "apr-debuginfo-0:1.4.8-3.el7_3.1.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)", "product_id": "7ComputeNode-optional-7.3.EUS:apr-debuginfo-0:1.4.8-3.el7_3.1.ppc64" }, "product_reference": "apr-debuginfo-0:1.4.8-3.el7_3.1.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "apr-debuginfo-0:1.4.8-3.el7_3.1.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)", "product_id": "7ComputeNode-optional-7.3.EUS:apr-debuginfo-0:1.4.8-3.el7_3.1.ppc64le" }, "product_reference": "apr-debuginfo-0:1.4.8-3.el7_3.1.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "apr-debuginfo-0:1.4.8-3.el7_3.1.s390 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)", "product_id": "7ComputeNode-optional-7.3.EUS:apr-debuginfo-0:1.4.8-3.el7_3.1.s390" }, "product_reference": "apr-debuginfo-0:1.4.8-3.el7_3.1.s390", "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "apr-debuginfo-0:1.4.8-3.el7_3.1.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)", "product_id": "7ComputeNode-optional-7.3.EUS:apr-debuginfo-0:1.4.8-3.el7_3.1.s390x" }, "product_reference": "apr-debuginfo-0:1.4.8-3.el7_3.1.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "apr-debuginfo-0:1.4.8-3.el7_3.1.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)", "product_id": "7ComputeNode-optional-7.3.EUS:apr-debuginfo-0:1.4.8-3.el7_3.1.x86_64" }, "product_reference": "apr-debuginfo-0:1.4.8-3.el7_3.1.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "apr-devel-0:1.4.8-3.el7_3.1.i686 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)", "product_id": "7ComputeNode-optional-7.3.EUS:apr-devel-0:1.4.8-3.el7_3.1.i686" }, "product_reference": "apr-devel-0:1.4.8-3.el7_3.1.i686", "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "apr-devel-0:1.4.8-3.el7_3.1.ppc as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)", "product_id": "7ComputeNode-optional-7.3.EUS:apr-devel-0:1.4.8-3.el7_3.1.ppc" }, "product_reference": "apr-devel-0:1.4.8-3.el7_3.1.ppc", "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "apr-devel-0:1.4.8-3.el7_3.1.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)", "product_id": "7ComputeNode-optional-7.3.EUS:apr-devel-0:1.4.8-3.el7_3.1.ppc64" }, "product_reference": "apr-devel-0:1.4.8-3.el7_3.1.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "apr-devel-0:1.4.8-3.el7_3.1.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)", "product_id": "7ComputeNode-optional-7.3.EUS:apr-devel-0:1.4.8-3.el7_3.1.ppc64le" }, "product_reference": "apr-devel-0:1.4.8-3.el7_3.1.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "apr-devel-0:1.4.8-3.el7_3.1.s390 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)", "product_id": "7ComputeNode-optional-7.3.EUS:apr-devel-0:1.4.8-3.el7_3.1.s390" }, "product_reference": "apr-devel-0:1.4.8-3.el7_3.1.s390", "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "apr-devel-0:1.4.8-3.el7_3.1.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)", "product_id": "7ComputeNode-optional-7.3.EUS:apr-devel-0:1.4.8-3.el7_3.1.s390x" }, "product_reference": "apr-devel-0:1.4.8-3.el7_3.1.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "apr-devel-0:1.4.8-3.el7_3.1.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)", "product_id": "7ComputeNode-optional-7.3.EUS:apr-devel-0:1.4.8-3.el7_3.1.x86_64" }, "product_reference": "apr-devel-0:1.4.8-3.el7_3.1.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "apr-0:1.4.8-3.el7_2.1.i686 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)", "product_id": "7Server-7.2.AUS:apr-0:1.4.8-3.el7_2.1.i686" }, "product_reference": "apr-0:1.4.8-3.el7_2.1.i686", "relates_to_product_reference": "7Server-7.2.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "apr-0:1.4.8-3.el7_2.1.src as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)", "product_id": "7Server-7.2.AUS:apr-0:1.4.8-3.el7_2.1.src" }, "product_reference": "apr-0:1.4.8-3.el7_2.1.src", "relates_to_product_reference": "7Server-7.2.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "apr-0:1.4.8-3.el7_2.1.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)", "product_id": "7Server-7.2.AUS:apr-0:1.4.8-3.el7_2.1.x86_64" }, "product_reference": "apr-0:1.4.8-3.el7_2.1.x86_64", "relates_to_product_reference": "7Server-7.2.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "apr-debuginfo-0:1.4.8-3.el7_2.1.i686 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)", "product_id": "7Server-7.2.AUS:apr-debuginfo-0:1.4.8-3.el7_2.1.i686" }, "product_reference": "apr-debuginfo-0:1.4.8-3.el7_2.1.i686", "relates_to_product_reference": "7Server-7.2.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "apr-debuginfo-0:1.4.8-3.el7_2.1.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)", "product_id": "7Server-7.2.AUS:apr-debuginfo-0:1.4.8-3.el7_2.1.x86_64" }, "product_reference": "apr-debuginfo-0:1.4.8-3.el7_2.1.x86_64", "relates_to_product_reference": "7Server-7.2.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "apr-devel-0:1.4.8-3.el7_2.1.i686 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)", "product_id": "7Server-7.2.AUS:apr-devel-0:1.4.8-3.el7_2.1.i686" }, "product_reference": "apr-devel-0:1.4.8-3.el7_2.1.i686", "relates_to_product_reference": "7Server-7.2.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "apr-devel-0:1.4.8-3.el7_2.1.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)", "product_id": "7Server-7.2.AUS:apr-devel-0:1.4.8-3.el7_2.1.x86_64" }, "product_reference": "apr-devel-0:1.4.8-3.el7_2.1.x86_64", "relates_to_product_reference": "7Server-7.2.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "apr-0:1.4.8-3.el7_2.1.i686 as a component of Red Hat Enterprise Linux Server E4S (v. 7.2)", "product_id": "7Server-7.2.E4S:apr-0:1.4.8-3.el7_2.1.i686" }, "product_reference": "apr-0:1.4.8-3.el7_2.1.i686", "relates_to_product_reference": "7Server-7.2.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "apr-0:1.4.8-3.el7_2.1.src as a component of Red Hat Enterprise Linux Server E4S (v. 7.2)", "product_id": "7Server-7.2.E4S:apr-0:1.4.8-3.el7_2.1.src" }, "product_reference": "apr-0:1.4.8-3.el7_2.1.src", "relates_to_product_reference": "7Server-7.2.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "apr-0:1.4.8-3.el7_2.1.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.2)", "product_id": "7Server-7.2.E4S:apr-0:1.4.8-3.el7_2.1.x86_64" }, "product_reference": "apr-0:1.4.8-3.el7_2.1.x86_64", "relates_to_product_reference": "7Server-7.2.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "apr-debuginfo-0:1.4.8-3.el7_2.1.i686 as a component of Red Hat Enterprise Linux Server E4S (v. 7.2)", "product_id": "7Server-7.2.E4S:apr-debuginfo-0:1.4.8-3.el7_2.1.i686" }, "product_reference": "apr-debuginfo-0:1.4.8-3.el7_2.1.i686", "relates_to_product_reference": "7Server-7.2.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "apr-debuginfo-0:1.4.8-3.el7_2.1.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.2)", "product_id": "7Server-7.2.E4S:apr-debuginfo-0:1.4.8-3.el7_2.1.x86_64" }, "product_reference": "apr-debuginfo-0:1.4.8-3.el7_2.1.x86_64", "relates_to_product_reference": "7Server-7.2.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "apr-devel-0:1.4.8-3.el7_2.1.i686 as a component of Red Hat Enterprise Linux Server E4S (v. 7.2)", "product_id": "7Server-7.2.E4S:apr-devel-0:1.4.8-3.el7_2.1.i686" }, "product_reference": "apr-devel-0:1.4.8-3.el7_2.1.i686", "relates_to_product_reference": "7Server-7.2.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "apr-devel-0:1.4.8-3.el7_2.1.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.2)", "product_id": "7Server-7.2.E4S:apr-devel-0:1.4.8-3.el7_2.1.x86_64" }, "product_reference": "apr-devel-0:1.4.8-3.el7_2.1.x86_64", "relates_to_product_reference": "7Server-7.2.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "apr-0:1.4.8-3.el7_2.1.i686 as a component of Red Hat Enterprise Linux Server TUS (v. 7.2)", "product_id": "7Server-7.2.TUS:apr-0:1.4.8-3.el7_2.1.i686" }, "product_reference": "apr-0:1.4.8-3.el7_2.1.i686", "relates_to_product_reference": "7Server-7.2.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "apr-0:1.4.8-3.el7_2.1.src as a component of Red Hat Enterprise Linux Server TUS (v. 7.2)", "product_id": "7Server-7.2.TUS:apr-0:1.4.8-3.el7_2.1.src" }, "product_reference": "apr-0:1.4.8-3.el7_2.1.src", "relates_to_product_reference": "7Server-7.2.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "apr-0:1.4.8-3.el7_2.1.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.2)", "product_id": "7Server-7.2.TUS:apr-0:1.4.8-3.el7_2.1.x86_64" }, "product_reference": "apr-0:1.4.8-3.el7_2.1.x86_64", "relates_to_product_reference": "7Server-7.2.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "apr-debuginfo-0:1.4.8-3.el7_2.1.i686 as a component of Red Hat Enterprise Linux Server TUS (v. 7.2)", "product_id": "7Server-7.2.TUS:apr-debuginfo-0:1.4.8-3.el7_2.1.i686" }, "product_reference": "apr-debuginfo-0:1.4.8-3.el7_2.1.i686", "relates_to_product_reference": "7Server-7.2.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "apr-debuginfo-0:1.4.8-3.el7_2.1.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.2)", "product_id": "7Server-7.2.TUS:apr-debuginfo-0:1.4.8-3.el7_2.1.x86_64" }, "product_reference": "apr-debuginfo-0:1.4.8-3.el7_2.1.x86_64", "relates_to_product_reference": "7Server-7.2.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "apr-devel-0:1.4.8-3.el7_2.1.i686 as a component of Red Hat Enterprise Linux Server TUS (v. 7.2)", "product_id": "7Server-7.2.TUS:apr-devel-0:1.4.8-3.el7_2.1.i686" }, "product_reference": "apr-devel-0:1.4.8-3.el7_2.1.i686", "relates_to_product_reference": "7Server-7.2.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "apr-devel-0:1.4.8-3.el7_2.1.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.2)", "product_id": "7Server-7.2.TUS:apr-devel-0:1.4.8-3.el7_2.1.x86_64" }, "product_reference": "apr-devel-0:1.4.8-3.el7_2.1.x86_64", "relates_to_product_reference": "7Server-7.2.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "apr-0:1.4.8-3.el7_3.1.i686 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)", "product_id": "7Server-7.3.EUS:apr-0:1.4.8-3.el7_3.1.i686" }, "product_reference": "apr-0:1.4.8-3.el7_3.1.i686", "relates_to_product_reference": "7Server-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "apr-0:1.4.8-3.el7_3.1.ppc as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)", "product_id": "7Server-7.3.EUS:apr-0:1.4.8-3.el7_3.1.ppc" }, "product_reference": "apr-0:1.4.8-3.el7_3.1.ppc", "relates_to_product_reference": "7Server-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "apr-0:1.4.8-3.el7_3.1.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)", "product_id": "7Server-7.3.EUS:apr-0:1.4.8-3.el7_3.1.ppc64" }, "product_reference": "apr-0:1.4.8-3.el7_3.1.ppc64", "relates_to_product_reference": "7Server-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "apr-0:1.4.8-3.el7_3.1.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)", "product_id": "7Server-7.3.EUS:apr-0:1.4.8-3.el7_3.1.ppc64le" }, "product_reference": "apr-0:1.4.8-3.el7_3.1.ppc64le", "relates_to_product_reference": "7Server-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "apr-0:1.4.8-3.el7_3.1.s390 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)", "product_id": "7Server-7.3.EUS:apr-0:1.4.8-3.el7_3.1.s390" }, "product_reference": "apr-0:1.4.8-3.el7_3.1.s390", "relates_to_product_reference": "7Server-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "apr-0:1.4.8-3.el7_3.1.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)", "product_id": "7Server-7.3.EUS:apr-0:1.4.8-3.el7_3.1.s390x" }, "product_reference": "apr-0:1.4.8-3.el7_3.1.s390x", "relates_to_product_reference": "7Server-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "apr-0:1.4.8-3.el7_3.1.src as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)", "product_id": "7Server-7.3.EUS:apr-0:1.4.8-3.el7_3.1.src" }, "product_reference": "apr-0:1.4.8-3.el7_3.1.src", "relates_to_product_reference": "7Server-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "apr-0:1.4.8-3.el7_3.1.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)", "product_id": "7Server-7.3.EUS:apr-0:1.4.8-3.el7_3.1.x86_64" }, "product_reference": "apr-0:1.4.8-3.el7_3.1.x86_64", "relates_to_product_reference": "7Server-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "apr-debuginfo-0:1.4.8-3.el7_3.1.i686 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)", "product_id": "7Server-7.3.EUS:apr-debuginfo-0:1.4.8-3.el7_3.1.i686" }, "product_reference": "apr-debuginfo-0:1.4.8-3.el7_3.1.i686", "relates_to_product_reference": "7Server-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "apr-debuginfo-0:1.4.8-3.el7_3.1.ppc as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)", "product_id": "7Server-7.3.EUS:apr-debuginfo-0:1.4.8-3.el7_3.1.ppc" }, "product_reference": "apr-debuginfo-0:1.4.8-3.el7_3.1.ppc", "relates_to_product_reference": "7Server-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "apr-debuginfo-0:1.4.8-3.el7_3.1.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)", "product_id": "7Server-7.3.EUS:apr-debuginfo-0:1.4.8-3.el7_3.1.ppc64" }, "product_reference": "apr-debuginfo-0:1.4.8-3.el7_3.1.ppc64", "relates_to_product_reference": "7Server-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "apr-debuginfo-0:1.4.8-3.el7_3.1.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)", "product_id": "7Server-7.3.EUS:apr-debuginfo-0:1.4.8-3.el7_3.1.ppc64le" }, "product_reference": "apr-debuginfo-0:1.4.8-3.el7_3.1.ppc64le", "relates_to_product_reference": "7Server-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "apr-debuginfo-0:1.4.8-3.el7_3.1.s390 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)", "product_id": "7Server-7.3.EUS:apr-debuginfo-0:1.4.8-3.el7_3.1.s390" }, "product_reference": "apr-debuginfo-0:1.4.8-3.el7_3.1.s390", "relates_to_product_reference": "7Server-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "apr-debuginfo-0:1.4.8-3.el7_3.1.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)", "product_id": "7Server-7.3.EUS:apr-debuginfo-0:1.4.8-3.el7_3.1.s390x" }, "product_reference": "apr-debuginfo-0:1.4.8-3.el7_3.1.s390x", "relates_to_product_reference": "7Server-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "apr-debuginfo-0:1.4.8-3.el7_3.1.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)", "product_id": "7Server-7.3.EUS:apr-debuginfo-0:1.4.8-3.el7_3.1.x86_64" }, "product_reference": "apr-debuginfo-0:1.4.8-3.el7_3.1.x86_64", "relates_to_product_reference": "7Server-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "apr-devel-0:1.4.8-3.el7_3.1.i686 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)", "product_id": "7Server-7.3.EUS:apr-devel-0:1.4.8-3.el7_3.1.i686" }, "product_reference": "apr-devel-0:1.4.8-3.el7_3.1.i686", "relates_to_product_reference": "7Server-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "apr-devel-0:1.4.8-3.el7_3.1.ppc as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)", "product_id": "7Server-7.3.EUS:apr-devel-0:1.4.8-3.el7_3.1.ppc" }, "product_reference": "apr-devel-0:1.4.8-3.el7_3.1.ppc", "relates_to_product_reference": "7Server-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "apr-devel-0:1.4.8-3.el7_3.1.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)", "product_id": "7Server-7.3.EUS:apr-devel-0:1.4.8-3.el7_3.1.ppc64" }, "product_reference": "apr-devel-0:1.4.8-3.el7_3.1.ppc64", "relates_to_product_reference": "7Server-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "apr-devel-0:1.4.8-3.el7_3.1.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)", "product_id": "7Server-7.3.EUS:apr-devel-0:1.4.8-3.el7_3.1.ppc64le" }, "product_reference": "apr-devel-0:1.4.8-3.el7_3.1.ppc64le", "relates_to_product_reference": "7Server-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "apr-devel-0:1.4.8-3.el7_3.1.s390 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)", "product_id": "7Server-7.3.EUS:apr-devel-0:1.4.8-3.el7_3.1.s390" }, "product_reference": "apr-devel-0:1.4.8-3.el7_3.1.s390", "relates_to_product_reference": "7Server-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "apr-devel-0:1.4.8-3.el7_3.1.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)", "product_id": "7Server-7.3.EUS:apr-devel-0:1.4.8-3.el7_3.1.s390x" }, "product_reference": "apr-devel-0:1.4.8-3.el7_3.1.s390x", "relates_to_product_reference": "7Server-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "apr-devel-0:1.4.8-3.el7_3.1.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)", "product_id": "7Server-7.3.EUS:apr-devel-0:1.4.8-3.el7_3.1.x86_64" }, "product_reference": "apr-devel-0:1.4.8-3.el7_3.1.x86_64", "relates_to_product_reference": "7Server-7.3.EUS" } ] }, "vulnerabilities": [ { "cve": "CVE-2017-12613", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "discovery_date": "2017-10-24T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1506523" } ], "notes": [ { "category": "description", "text": "An out-of-bounds array dereference was found in apr_time_exp_get(). An attacker could abuse an unvalidated usage of this function to cause a denial of service or potentially lead to data leak.", "title": "Vulnerability description" }, { "category": "summary", "text": "apr: Out-of-bounds array deref in apr_time_exp*() functions", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6ComputeNode-6.7.EUS:apr-0:1.3.9-5.el6_7.1.i686", "6ComputeNode-6.7.EUS:apr-0:1.3.9-5.el6_7.1.ppc", "6ComputeNode-6.7.EUS:apr-0:1.3.9-5.el6_7.1.ppc64", "6ComputeNode-6.7.EUS:apr-0:1.3.9-5.el6_7.1.s390", "6ComputeNode-6.7.EUS:apr-0:1.3.9-5.el6_7.1.s390x", "6ComputeNode-6.7.EUS:apr-0:1.3.9-5.el6_7.1.src", "6ComputeNode-6.7.EUS:apr-0:1.3.9-5.el6_7.1.x86_64", "6ComputeNode-6.7.EUS:apr-debuginfo-0:1.3.9-5.el6_7.1.i686", "6ComputeNode-6.7.EUS:apr-debuginfo-0:1.3.9-5.el6_7.1.ppc", "6ComputeNode-6.7.EUS:apr-debuginfo-0:1.3.9-5.el6_7.1.ppc64", "6ComputeNode-6.7.EUS:apr-debuginfo-0:1.3.9-5.el6_7.1.s390", "6ComputeNode-6.7.EUS:apr-debuginfo-0:1.3.9-5.el6_7.1.s390x", "6ComputeNode-6.7.EUS:apr-debuginfo-0:1.3.9-5.el6_7.1.x86_64", "6ComputeNode-6.7.EUS:apr-devel-0:1.3.9-5.el6_7.1.i686", "6ComputeNode-6.7.EUS:apr-devel-0:1.3.9-5.el6_7.1.ppc", "6ComputeNode-6.7.EUS:apr-devel-0:1.3.9-5.el6_7.1.ppc64", "6ComputeNode-6.7.EUS:apr-devel-0:1.3.9-5.el6_7.1.s390", "6ComputeNode-6.7.EUS:apr-devel-0:1.3.9-5.el6_7.1.s390x", "6ComputeNode-6.7.EUS:apr-devel-0:1.3.9-5.el6_7.1.x86_64", "6ComputeNode-optional-6.7.EUS:apr-0:1.3.9-5.el6_7.1.i686", "6ComputeNode-optional-6.7.EUS:apr-0:1.3.9-5.el6_7.1.ppc", "6ComputeNode-optional-6.7.EUS:apr-0:1.3.9-5.el6_7.1.ppc64", "6ComputeNode-optional-6.7.EUS:apr-0:1.3.9-5.el6_7.1.s390", "6ComputeNode-optional-6.7.EUS:apr-0:1.3.9-5.el6_7.1.s390x", "6ComputeNode-optional-6.7.EUS:apr-0:1.3.9-5.el6_7.1.src", "6ComputeNode-optional-6.7.EUS:apr-0:1.3.9-5.el6_7.1.x86_64", "6ComputeNode-optional-6.7.EUS:apr-debuginfo-0:1.3.9-5.el6_7.1.i686", "6ComputeNode-optional-6.7.EUS:apr-debuginfo-0:1.3.9-5.el6_7.1.ppc", "6ComputeNode-optional-6.7.EUS:apr-debuginfo-0:1.3.9-5.el6_7.1.ppc64", "6ComputeNode-optional-6.7.EUS:apr-debuginfo-0:1.3.9-5.el6_7.1.s390", "6ComputeNode-optional-6.7.EUS:apr-debuginfo-0:1.3.9-5.el6_7.1.s390x", "6ComputeNode-optional-6.7.EUS:apr-debuginfo-0:1.3.9-5.el6_7.1.x86_64", "6ComputeNode-optional-6.7.EUS:apr-devel-0:1.3.9-5.el6_7.1.i686", "6ComputeNode-optional-6.7.EUS:apr-devel-0:1.3.9-5.el6_7.1.ppc", "6ComputeNode-optional-6.7.EUS:apr-devel-0:1.3.9-5.el6_7.1.ppc64", "6ComputeNode-optional-6.7.EUS:apr-devel-0:1.3.9-5.el6_7.1.s390", "6ComputeNode-optional-6.7.EUS:apr-devel-0:1.3.9-5.el6_7.1.s390x", "6ComputeNode-optional-6.7.EUS:apr-devel-0:1.3.9-5.el6_7.1.x86_64", "6Server-6.4.AUS:apr-0:1.3.9-5.el6_4.1.i686", "6Server-6.4.AUS:apr-0:1.3.9-5.el6_4.1.src", "6Server-6.4.AUS:apr-0:1.3.9-5.el6_4.1.x86_64", "6Server-6.4.AUS:apr-debuginfo-0:1.3.9-5.el6_4.1.i686", "6Server-6.4.AUS:apr-debuginfo-0:1.3.9-5.el6_4.1.x86_64", "6Server-6.4.AUS:apr-devel-0:1.3.9-5.el6_4.1.i686", "6Server-6.4.AUS:apr-devel-0:1.3.9-5.el6_4.1.x86_64", "6Server-6.5.AUS:apr-0:1.3.9-5.el6_5.1.i686", "6Server-6.5.AUS:apr-0:1.3.9-5.el6_5.1.src", "6Server-6.5.AUS:apr-0:1.3.9-5.el6_5.1.x86_64", "6Server-6.5.AUS:apr-debuginfo-0:1.3.9-5.el6_5.1.i686", "6Server-6.5.AUS:apr-debuginfo-0:1.3.9-5.el6_5.1.x86_64", "6Server-6.5.AUS:apr-devel-0:1.3.9-5.el6_5.1.i686", "6Server-6.5.AUS:apr-devel-0:1.3.9-5.el6_5.1.x86_64", "6Server-6.6.AUS:apr-0:1.3.9-5.el6_6.1.i686", "6Server-6.6.AUS:apr-0:1.3.9-5.el6_6.1.src", "6Server-6.6.AUS:apr-0:1.3.9-5.el6_6.1.x86_64", "6Server-6.6.AUS:apr-debuginfo-0:1.3.9-5.el6_6.1.i686", "6Server-6.6.AUS:apr-debuginfo-0:1.3.9-5.el6_6.1.x86_64", "6Server-6.6.AUS:apr-devel-0:1.3.9-5.el6_6.1.i686", "6Server-6.6.AUS:apr-devel-0:1.3.9-5.el6_6.1.x86_64", "6Server-6.6.TUS:apr-0:1.3.9-5.el6_6.1.i686", "6Server-6.6.TUS:apr-0:1.3.9-5.el6_6.1.src", "6Server-6.6.TUS:apr-0:1.3.9-5.el6_6.1.x86_64", "6Server-6.6.TUS:apr-debuginfo-0:1.3.9-5.el6_6.1.i686", "6Server-6.6.TUS:apr-debuginfo-0:1.3.9-5.el6_6.1.x86_64", "6Server-6.6.TUS:apr-devel-0:1.3.9-5.el6_6.1.i686", "6Server-6.6.TUS:apr-devel-0:1.3.9-5.el6_6.1.x86_64", "6Server-6.7.EUS:apr-0:1.3.9-5.el6_7.1.i686", "6Server-6.7.EUS:apr-0:1.3.9-5.el6_7.1.ppc", "6Server-6.7.EUS:apr-0:1.3.9-5.el6_7.1.ppc64", "6Server-6.7.EUS:apr-0:1.3.9-5.el6_7.1.s390", "6Server-6.7.EUS:apr-0:1.3.9-5.el6_7.1.s390x", "6Server-6.7.EUS:apr-0:1.3.9-5.el6_7.1.src", "6Server-6.7.EUS:apr-0:1.3.9-5.el6_7.1.x86_64", "6Server-6.7.EUS:apr-debuginfo-0:1.3.9-5.el6_7.1.i686", "6Server-6.7.EUS:apr-debuginfo-0:1.3.9-5.el6_7.1.ppc", "6Server-6.7.EUS:apr-debuginfo-0:1.3.9-5.el6_7.1.ppc64", "6Server-6.7.EUS:apr-debuginfo-0:1.3.9-5.el6_7.1.s390", "6Server-6.7.EUS:apr-debuginfo-0:1.3.9-5.el6_7.1.s390x", "6Server-6.7.EUS:apr-debuginfo-0:1.3.9-5.el6_7.1.x86_64", "6Server-6.7.EUS:apr-devel-0:1.3.9-5.el6_7.1.i686", "6Server-6.7.EUS:apr-devel-0:1.3.9-5.el6_7.1.ppc", "6Server-6.7.EUS:apr-devel-0:1.3.9-5.el6_7.1.ppc64", "6Server-6.7.EUS:apr-devel-0:1.3.9-5.el6_7.1.s390", "6Server-6.7.EUS:apr-devel-0:1.3.9-5.el6_7.1.s390x", "6Server-6.7.EUS:apr-devel-0:1.3.9-5.el6_7.1.x86_64", "7ComputeNode-optional-7.3.EUS:apr-0:1.4.8-3.el7_3.1.i686", "7ComputeNode-optional-7.3.EUS:apr-0:1.4.8-3.el7_3.1.ppc", "7ComputeNode-optional-7.3.EUS:apr-0:1.4.8-3.el7_3.1.ppc64", "7ComputeNode-optional-7.3.EUS:apr-0:1.4.8-3.el7_3.1.ppc64le", "7ComputeNode-optional-7.3.EUS:apr-0:1.4.8-3.el7_3.1.s390", "7ComputeNode-optional-7.3.EUS:apr-0:1.4.8-3.el7_3.1.s390x", "7ComputeNode-optional-7.3.EUS:apr-0:1.4.8-3.el7_3.1.src", "7ComputeNode-optional-7.3.EUS:apr-0:1.4.8-3.el7_3.1.x86_64", "7ComputeNode-optional-7.3.EUS:apr-debuginfo-0:1.4.8-3.el7_3.1.i686", "7ComputeNode-optional-7.3.EUS:apr-debuginfo-0:1.4.8-3.el7_3.1.ppc", "7ComputeNode-optional-7.3.EUS:apr-debuginfo-0:1.4.8-3.el7_3.1.ppc64", "7ComputeNode-optional-7.3.EUS:apr-debuginfo-0:1.4.8-3.el7_3.1.ppc64le", "7ComputeNode-optional-7.3.EUS:apr-debuginfo-0:1.4.8-3.el7_3.1.s390", "7ComputeNode-optional-7.3.EUS:apr-debuginfo-0:1.4.8-3.el7_3.1.s390x", "7ComputeNode-optional-7.3.EUS:apr-debuginfo-0:1.4.8-3.el7_3.1.x86_64", "7ComputeNode-optional-7.3.EUS:apr-devel-0:1.4.8-3.el7_3.1.i686", "7ComputeNode-optional-7.3.EUS:apr-devel-0:1.4.8-3.el7_3.1.ppc", "7ComputeNode-optional-7.3.EUS:apr-devel-0:1.4.8-3.el7_3.1.ppc64", "7ComputeNode-optional-7.3.EUS:apr-devel-0:1.4.8-3.el7_3.1.ppc64le", "7ComputeNode-optional-7.3.EUS:apr-devel-0:1.4.8-3.el7_3.1.s390", "7ComputeNode-optional-7.3.EUS:apr-devel-0:1.4.8-3.el7_3.1.s390x", "7ComputeNode-optional-7.3.EUS:apr-devel-0:1.4.8-3.el7_3.1.x86_64", "7Server-7.2.AUS:apr-0:1.4.8-3.el7_2.1.i686", "7Server-7.2.AUS:apr-0:1.4.8-3.el7_2.1.src", "7Server-7.2.AUS:apr-0:1.4.8-3.el7_2.1.x86_64", "7Server-7.2.AUS:apr-debuginfo-0:1.4.8-3.el7_2.1.i686", "7Server-7.2.AUS:apr-debuginfo-0:1.4.8-3.el7_2.1.x86_64", "7Server-7.2.AUS:apr-devel-0:1.4.8-3.el7_2.1.i686", "7Server-7.2.AUS:apr-devel-0:1.4.8-3.el7_2.1.x86_64", "7Server-7.2.E4S:apr-0:1.4.8-3.el7_2.1.i686", "7Server-7.2.E4S:apr-0:1.4.8-3.el7_2.1.src", "7Server-7.2.E4S:apr-0:1.4.8-3.el7_2.1.x86_64", "7Server-7.2.E4S:apr-debuginfo-0:1.4.8-3.el7_2.1.i686", "7Server-7.2.E4S:apr-debuginfo-0:1.4.8-3.el7_2.1.x86_64", "7Server-7.2.E4S:apr-devel-0:1.4.8-3.el7_2.1.i686", "7Server-7.2.E4S:apr-devel-0:1.4.8-3.el7_2.1.x86_64", "7Server-7.2.TUS:apr-0:1.4.8-3.el7_2.1.i686", "7Server-7.2.TUS:apr-0:1.4.8-3.el7_2.1.src", "7Server-7.2.TUS:apr-0:1.4.8-3.el7_2.1.x86_64", "7Server-7.2.TUS:apr-debuginfo-0:1.4.8-3.el7_2.1.i686", "7Server-7.2.TUS:apr-debuginfo-0:1.4.8-3.el7_2.1.x86_64", "7Server-7.2.TUS:apr-devel-0:1.4.8-3.el7_2.1.i686", "7Server-7.2.TUS:apr-devel-0:1.4.8-3.el7_2.1.x86_64", "7Server-7.3.EUS:apr-0:1.4.8-3.el7_3.1.i686", "7Server-7.3.EUS:apr-0:1.4.8-3.el7_3.1.ppc", "7Server-7.3.EUS:apr-0:1.4.8-3.el7_3.1.ppc64", "7Server-7.3.EUS:apr-0:1.4.8-3.el7_3.1.ppc64le", "7Server-7.3.EUS:apr-0:1.4.8-3.el7_3.1.s390", "7Server-7.3.EUS:apr-0:1.4.8-3.el7_3.1.s390x", "7Server-7.3.EUS:apr-0:1.4.8-3.el7_3.1.src", "7Server-7.3.EUS:apr-0:1.4.8-3.el7_3.1.x86_64", "7Server-7.3.EUS:apr-debuginfo-0:1.4.8-3.el7_3.1.i686", "7Server-7.3.EUS:apr-debuginfo-0:1.4.8-3.el7_3.1.ppc", "7Server-7.3.EUS:apr-debuginfo-0:1.4.8-3.el7_3.1.ppc64", "7Server-7.3.EUS:apr-debuginfo-0:1.4.8-3.el7_3.1.ppc64le", "7Server-7.3.EUS:apr-debuginfo-0:1.4.8-3.el7_3.1.s390", "7Server-7.3.EUS:apr-debuginfo-0:1.4.8-3.el7_3.1.s390x", "7Server-7.3.EUS:apr-debuginfo-0:1.4.8-3.el7_3.1.x86_64", "7Server-7.3.EUS:apr-devel-0:1.4.8-3.el7_3.1.i686", "7Server-7.3.EUS:apr-devel-0:1.4.8-3.el7_3.1.ppc", "7Server-7.3.EUS:apr-devel-0:1.4.8-3.el7_3.1.ppc64", "7Server-7.3.EUS:apr-devel-0:1.4.8-3.el7_3.1.ppc64le", "7Server-7.3.EUS:apr-devel-0:1.4.8-3.el7_3.1.s390", "7Server-7.3.EUS:apr-devel-0:1.4.8-3.el7_3.1.s390x", "7Server-7.3.EUS:apr-devel-0:1.4.8-3.el7_3.1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2017-12613" }, { "category": "external", "summary": "RHBZ#1506523", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1506523" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2017-12613", "url": "https://www.cve.org/CVERecord?id=CVE-2017-12613" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-12613", "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-12613" }, { "category": "external", "summary": "http://www.apache.org/dist/apr/Announcement1.x.html", "url": "http://www.apache.org/dist/apr/Announcement1.x.html" } ], "release_date": "2017-10-23T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-04-26T21:03:51+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nApplications using the APR libraries, such as httpd, must be restarted for this update to take effect.", "product_ids": [ "6ComputeNode-6.7.EUS:apr-0:1.3.9-5.el6_7.1.i686", "6ComputeNode-6.7.EUS:apr-0:1.3.9-5.el6_7.1.ppc", "6ComputeNode-6.7.EUS:apr-0:1.3.9-5.el6_7.1.ppc64", "6ComputeNode-6.7.EUS:apr-0:1.3.9-5.el6_7.1.s390", "6ComputeNode-6.7.EUS:apr-0:1.3.9-5.el6_7.1.s390x", "6ComputeNode-6.7.EUS:apr-0:1.3.9-5.el6_7.1.src", "6ComputeNode-6.7.EUS:apr-0:1.3.9-5.el6_7.1.x86_64", "6ComputeNode-6.7.EUS:apr-debuginfo-0:1.3.9-5.el6_7.1.i686", "6ComputeNode-6.7.EUS:apr-debuginfo-0:1.3.9-5.el6_7.1.ppc", "6ComputeNode-6.7.EUS:apr-debuginfo-0:1.3.9-5.el6_7.1.ppc64", "6ComputeNode-6.7.EUS:apr-debuginfo-0:1.3.9-5.el6_7.1.s390", "6ComputeNode-6.7.EUS:apr-debuginfo-0:1.3.9-5.el6_7.1.s390x", "6ComputeNode-6.7.EUS:apr-debuginfo-0:1.3.9-5.el6_7.1.x86_64", "6ComputeNode-6.7.EUS:apr-devel-0:1.3.9-5.el6_7.1.i686", "6ComputeNode-6.7.EUS:apr-devel-0:1.3.9-5.el6_7.1.ppc", "6ComputeNode-6.7.EUS:apr-devel-0:1.3.9-5.el6_7.1.ppc64", "6ComputeNode-6.7.EUS:apr-devel-0:1.3.9-5.el6_7.1.s390", "6ComputeNode-6.7.EUS:apr-devel-0:1.3.9-5.el6_7.1.s390x", "6ComputeNode-6.7.EUS:apr-devel-0:1.3.9-5.el6_7.1.x86_64", "6ComputeNode-optional-6.7.EUS:apr-0:1.3.9-5.el6_7.1.i686", "6ComputeNode-optional-6.7.EUS:apr-0:1.3.9-5.el6_7.1.ppc", "6ComputeNode-optional-6.7.EUS:apr-0:1.3.9-5.el6_7.1.ppc64", "6ComputeNode-optional-6.7.EUS:apr-0:1.3.9-5.el6_7.1.s390", "6ComputeNode-optional-6.7.EUS:apr-0:1.3.9-5.el6_7.1.s390x", "6ComputeNode-optional-6.7.EUS:apr-0:1.3.9-5.el6_7.1.src", "6ComputeNode-optional-6.7.EUS:apr-0:1.3.9-5.el6_7.1.x86_64", "6ComputeNode-optional-6.7.EUS:apr-debuginfo-0:1.3.9-5.el6_7.1.i686", "6ComputeNode-optional-6.7.EUS:apr-debuginfo-0:1.3.9-5.el6_7.1.ppc", "6ComputeNode-optional-6.7.EUS:apr-debuginfo-0:1.3.9-5.el6_7.1.ppc64", "6ComputeNode-optional-6.7.EUS:apr-debuginfo-0:1.3.9-5.el6_7.1.s390", "6ComputeNode-optional-6.7.EUS:apr-debuginfo-0:1.3.9-5.el6_7.1.s390x", "6ComputeNode-optional-6.7.EUS:apr-debuginfo-0:1.3.9-5.el6_7.1.x86_64", "6ComputeNode-optional-6.7.EUS:apr-devel-0:1.3.9-5.el6_7.1.i686", "6ComputeNode-optional-6.7.EUS:apr-devel-0:1.3.9-5.el6_7.1.ppc", "6ComputeNode-optional-6.7.EUS:apr-devel-0:1.3.9-5.el6_7.1.ppc64", "6ComputeNode-optional-6.7.EUS:apr-devel-0:1.3.9-5.el6_7.1.s390", "6ComputeNode-optional-6.7.EUS:apr-devel-0:1.3.9-5.el6_7.1.s390x", "6ComputeNode-optional-6.7.EUS:apr-devel-0:1.3.9-5.el6_7.1.x86_64", "6Server-6.4.AUS:apr-0:1.3.9-5.el6_4.1.i686", "6Server-6.4.AUS:apr-0:1.3.9-5.el6_4.1.src", "6Server-6.4.AUS:apr-0:1.3.9-5.el6_4.1.x86_64", "6Server-6.4.AUS:apr-debuginfo-0:1.3.9-5.el6_4.1.i686", "6Server-6.4.AUS:apr-debuginfo-0:1.3.9-5.el6_4.1.x86_64", "6Server-6.4.AUS:apr-devel-0:1.3.9-5.el6_4.1.i686", "6Server-6.4.AUS:apr-devel-0:1.3.9-5.el6_4.1.x86_64", "6Server-6.5.AUS:apr-0:1.3.9-5.el6_5.1.i686", "6Server-6.5.AUS:apr-0:1.3.9-5.el6_5.1.src", "6Server-6.5.AUS:apr-0:1.3.9-5.el6_5.1.x86_64", "6Server-6.5.AUS:apr-debuginfo-0:1.3.9-5.el6_5.1.i686", "6Server-6.5.AUS:apr-debuginfo-0:1.3.9-5.el6_5.1.x86_64", "6Server-6.5.AUS:apr-devel-0:1.3.9-5.el6_5.1.i686", "6Server-6.5.AUS:apr-devel-0:1.3.9-5.el6_5.1.x86_64", "6Server-6.6.AUS:apr-0:1.3.9-5.el6_6.1.i686", "6Server-6.6.AUS:apr-0:1.3.9-5.el6_6.1.src", "6Server-6.6.AUS:apr-0:1.3.9-5.el6_6.1.x86_64", "6Server-6.6.AUS:apr-debuginfo-0:1.3.9-5.el6_6.1.i686", "6Server-6.6.AUS:apr-debuginfo-0:1.3.9-5.el6_6.1.x86_64", "6Server-6.6.AUS:apr-devel-0:1.3.9-5.el6_6.1.i686", "6Server-6.6.AUS:apr-devel-0:1.3.9-5.el6_6.1.x86_64", "6Server-6.6.TUS:apr-0:1.3.9-5.el6_6.1.i686", "6Server-6.6.TUS:apr-0:1.3.9-5.el6_6.1.src", "6Server-6.6.TUS:apr-0:1.3.9-5.el6_6.1.x86_64", "6Server-6.6.TUS:apr-debuginfo-0:1.3.9-5.el6_6.1.i686", "6Server-6.6.TUS:apr-debuginfo-0:1.3.9-5.el6_6.1.x86_64", "6Server-6.6.TUS:apr-devel-0:1.3.9-5.el6_6.1.i686", "6Server-6.6.TUS:apr-devel-0:1.3.9-5.el6_6.1.x86_64", "6Server-6.7.EUS:apr-0:1.3.9-5.el6_7.1.i686", "6Server-6.7.EUS:apr-0:1.3.9-5.el6_7.1.ppc", "6Server-6.7.EUS:apr-0:1.3.9-5.el6_7.1.ppc64", "6Server-6.7.EUS:apr-0:1.3.9-5.el6_7.1.s390", "6Server-6.7.EUS:apr-0:1.3.9-5.el6_7.1.s390x", "6Server-6.7.EUS:apr-0:1.3.9-5.el6_7.1.src", "6Server-6.7.EUS:apr-0:1.3.9-5.el6_7.1.x86_64", "6Server-6.7.EUS:apr-debuginfo-0:1.3.9-5.el6_7.1.i686", "6Server-6.7.EUS:apr-debuginfo-0:1.3.9-5.el6_7.1.ppc", "6Server-6.7.EUS:apr-debuginfo-0:1.3.9-5.el6_7.1.ppc64", "6Server-6.7.EUS:apr-debuginfo-0:1.3.9-5.el6_7.1.s390", "6Server-6.7.EUS:apr-debuginfo-0:1.3.9-5.el6_7.1.s390x", "6Server-6.7.EUS:apr-debuginfo-0:1.3.9-5.el6_7.1.x86_64", "6Server-6.7.EUS:apr-devel-0:1.3.9-5.el6_7.1.i686", "6Server-6.7.EUS:apr-devel-0:1.3.9-5.el6_7.1.ppc", "6Server-6.7.EUS:apr-devel-0:1.3.9-5.el6_7.1.ppc64", "6Server-6.7.EUS:apr-devel-0:1.3.9-5.el6_7.1.s390", "6Server-6.7.EUS:apr-devel-0:1.3.9-5.el6_7.1.s390x", "6Server-6.7.EUS:apr-devel-0:1.3.9-5.el6_7.1.x86_64", "7ComputeNode-optional-7.3.EUS:apr-0:1.4.8-3.el7_3.1.i686", "7ComputeNode-optional-7.3.EUS:apr-0:1.4.8-3.el7_3.1.ppc", "7ComputeNode-optional-7.3.EUS:apr-0:1.4.8-3.el7_3.1.ppc64", "7ComputeNode-optional-7.3.EUS:apr-0:1.4.8-3.el7_3.1.ppc64le", "7ComputeNode-optional-7.3.EUS:apr-0:1.4.8-3.el7_3.1.s390", "7ComputeNode-optional-7.3.EUS:apr-0:1.4.8-3.el7_3.1.s390x", "7ComputeNode-optional-7.3.EUS:apr-0:1.4.8-3.el7_3.1.src", "7ComputeNode-optional-7.3.EUS:apr-0:1.4.8-3.el7_3.1.x86_64", "7ComputeNode-optional-7.3.EUS:apr-debuginfo-0:1.4.8-3.el7_3.1.i686", "7ComputeNode-optional-7.3.EUS:apr-debuginfo-0:1.4.8-3.el7_3.1.ppc", "7ComputeNode-optional-7.3.EUS:apr-debuginfo-0:1.4.8-3.el7_3.1.ppc64", "7ComputeNode-optional-7.3.EUS:apr-debuginfo-0:1.4.8-3.el7_3.1.ppc64le", "7ComputeNode-optional-7.3.EUS:apr-debuginfo-0:1.4.8-3.el7_3.1.s390", "7ComputeNode-optional-7.3.EUS:apr-debuginfo-0:1.4.8-3.el7_3.1.s390x", "7ComputeNode-optional-7.3.EUS:apr-debuginfo-0:1.4.8-3.el7_3.1.x86_64", "7ComputeNode-optional-7.3.EUS:apr-devel-0:1.4.8-3.el7_3.1.i686", "7ComputeNode-optional-7.3.EUS:apr-devel-0:1.4.8-3.el7_3.1.ppc", "7ComputeNode-optional-7.3.EUS:apr-devel-0:1.4.8-3.el7_3.1.ppc64", "7ComputeNode-optional-7.3.EUS:apr-devel-0:1.4.8-3.el7_3.1.ppc64le", "7ComputeNode-optional-7.3.EUS:apr-devel-0:1.4.8-3.el7_3.1.s390", "7ComputeNode-optional-7.3.EUS:apr-devel-0:1.4.8-3.el7_3.1.s390x", "7ComputeNode-optional-7.3.EUS:apr-devel-0:1.4.8-3.el7_3.1.x86_64", "7Server-7.2.AUS:apr-0:1.4.8-3.el7_2.1.i686", "7Server-7.2.AUS:apr-0:1.4.8-3.el7_2.1.src", "7Server-7.2.AUS:apr-0:1.4.8-3.el7_2.1.x86_64", "7Server-7.2.AUS:apr-debuginfo-0:1.4.8-3.el7_2.1.i686", "7Server-7.2.AUS:apr-debuginfo-0:1.4.8-3.el7_2.1.x86_64", "7Server-7.2.AUS:apr-devel-0:1.4.8-3.el7_2.1.i686", "7Server-7.2.AUS:apr-devel-0:1.4.8-3.el7_2.1.x86_64", "7Server-7.2.E4S:apr-0:1.4.8-3.el7_2.1.i686", "7Server-7.2.E4S:apr-0:1.4.8-3.el7_2.1.src", "7Server-7.2.E4S:apr-0:1.4.8-3.el7_2.1.x86_64", "7Server-7.2.E4S:apr-debuginfo-0:1.4.8-3.el7_2.1.i686", "7Server-7.2.E4S:apr-debuginfo-0:1.4.8-3.el7_2.1.x86_64", "7Server-7.2.E4S:apr-devel-0:1.4.8-3.el7_2.1.i686", "7Server-7.2.E4S:apr-devel-0:1.4.8-3.el7_2.1.x86_64", "7Server-7.2.TUS:apr-0:1.4.8-3.el7_2.1.i686", "7Server-7.2.TUS:apr-0:1.4.8-3.el7_2.1.src", "7Server-7.2.TUS:apr-0:1.4.8-3.el7_2.1.x86_64", "7Server-7.2.TUS:apr-debuginfo-0:1.4.8-3.el7_2.1.i686", "7Server-7.2.TUS:apr-debuginfo-0:1.4.8-3.el7_2.1.x86_64", "7Server-7.2.TUS:apr-devel-0:1.4.8-3.el7_2.1.i686", "7Server-7.2.TUS:apr-devel-0:1.4.8-3.el7_2.1.x86_64", "7Server-7.3.EUS:apr-0:1.4.8-3.el7_3.1.i686", "7Server-7.3.EUS:apr-0:1.4.8-3.el7_3.1.ppc", "7Server-7.3.EUS:apr-0:1.4.8-3.el7_3.1.ppc64", "7Server-7.3.EUS:apr-0:1.4.8-3.el7_3.1.ppc64le", "7Server-7.3.EUS:apr-0:1.4.8-3.el7_3.1.s390", "7Server-7.3.EUS:apr-0:1.4.8-3.el7_3.1.s390x", "7Server-7.3.EUS:apr-0:1.4.8-3.el7_3.1.src", "7Server-7.3.EUS:apr-0:1.4.8-3.el7_3.1.x86_64", "7Server-7.3.EUS:apr-debuginfo-0:1.4.8-3.el7_3.1.i686", "7Server-7.3.EUS:apr-debuginfo-0:1.4.8-3.el7_3.1.ppc", "7Server-7.3.EUS:apr-debuginfo-0:1.4.8-3.el7_3.1.ppc64", "7Server-7.3.EUS:apr-debuginfo-0:1.4.8-3.el7_3.1.ppc64le", "7Server-7.3.EUS:apr-debuginfo-0:1.4.8-3.el7_3.1.s390", "7Server-7.3.EUS:apr-debuginfo-0:1.4.8-3.el7_3.1.s390x", "7Server-7.3.EUS:apr-debuginfo-0:1.4.8-3.el7_3.1.x86_64", "7Server-7.3.EUS:apr-devel-0:1.4.8-3.el7_3.1.i686", "7Server-7.3.EUS:apr-devel-0:1.4.8-3.el7_3.1.ppc", "7Server-7.3.EUS:apr-devel-0:1.4.8-3.el7_3.1.ppc64", "7Server-7.3.EUS:apr-devel-0:1.4.8-3.el7_3.1.ppc64le", "7Server-7.3.EUS:apr-devel-0:1.4.8-3.el7_3.1.s390", "7Server-7.3.EUS:apr-devel-0:1.4.8-3.el7_3.1.s390x", "7Server-7.3.EUS:apr-devel-0:1.4.8-3.el7_3.1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2018:1253" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.4, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H", "version": "3.0" }, "products": [ "6ComputeNode-6.7.EUS:apr-0:1.3.9-5.el6_7.1.i686", "6ComputeNode-6.7.EUS:apr-0:1.3.9-5.el6_7.1.ppc", "6ComputeNode-6.7.EUS:apr-0:1.3.9-5.el6_7.1.ppc64", "6ComputeNode-6.7.EUS:apr-0:1.3.9-5.el6_7.1.s390", "6ComputeNode-6.7.EUS:apr-0:1.3.9-5.el6_7.1.s390x", "6ComputeNode-6.7.EUS:apr-0:1.3.9-5.el6_7.1.src", "6ComputeNode-6.7.EUS:apr-0:1.3.9-5.el6_7.1.x86_64", "6ComputeNode-6.7.EUS:apr-debuginfo-0:1.3.9-5.el6_7.1.i686", "6ComputeNode-6.7.EUS:apr-debuginfo-0:1.3.9-5.el6_7.1.ppc", "6ComputeNode-6.7.EUS:apr-debuginfo-0:1.3.9-5.el6_7.1.ppc64", "6ComputeNode-6.7.EUS:apr-debuginfo-0:1.3.9-5.el6_7.1.s390", "6ComputeNode-6.7.EUS:apr-debuginfo-0:1.3.9-5.el6_7.1.s390x", "6ComputeNode-6.7.EUS:apr-debuginfo-0:1.3.9-5.el6_7.1.x86_64", "6ComputeNode-6.7.EUS:apr-devel-0:1.3.9-5.el6_7.1.i686", "6ComputeNode-6.7.EUS:apr-devel-0:1.3.9-5.el6_7.1.ppc", "6ComputeNode-6.7.EUS:apr-devel-0:1.3.9-5.el6_7.1.ppc64", "6ComputeNode-6.7.EUS:apr-devel-0:1.3.9-5.el6_7.1.s390", "6ComputeNode-6.7.EUS:apr-devel-0:1.3.9-5.el6_7.1.s390x", "6ComputeNode-6.7.EUS:apr-devel-0:1.3.9-5.el6_7.1.x86_64", "6ComputeNode-optional-6.7.EUS:apr-0:1.3.9-5.el6_7.1.i686", "6ComputeNode-optional-6.7.EUS:apr-0:1.3.9-5.el6_7.1.ppc", "6ComputeNode-optional-6.7.EUS:apr-0:1.3.9-5.el6_7.1.ppc64", "6ComputeNode-optional-6.7.EUS:apr-0:1.3.9-5.el6_7.1.s390", "6ComputeNode-optional-6.7.EUS:apr-0:1.3.9-5.el6_7.1.s390x", "6ComputeNode-optional-6.7.EUS:apr-0:1.3.9-5.el6_7.1.src", "6ComputeNode-optional-6.7.EUS:apr-0:1.3.9-5.el6_7.1.x86_64", "6ComputeNode-optional-6.7.EUS:apr-debuginfo-0:1.3.9-5.el6_7.1.i686", "6ComputeNode-optional-6.7.EUS:apr-debuginfo-0:1.3.9-5.el6_7.1.ppc", "6ComputeNode-optional-6.7.EUS:apr-debuginfo-0:1.3.9-5.el6_7.1.ppc64", "6ComputeNode-optional-6.7.EUS:apr-debuginfo-0:1.3.9-5.el6_7.1.s390", "6ComputeNode-optional-6.7.EUS:apr-debuginfo-0:1.3.9-5.el6_7.1.s390x", "6ComputeNode-optional-6.7.EUS:apr-debuginfo-0:1.3.9-5.el6_7.1.x86_64", "6ComputeNode-optional-6.7.EUS:apr-devel-0:1.3.9-5.el6_7.1.i686", "6ComputeNode-optional-6.7.EUS:apr-devel-0:1.3.9-5.el6_7.1.ppc", "6ComputeNode-optional-6.7.EUS:apr-devel-0:1.3.9-5.el6_7.1.ppc64", "6ComputeNode-optional-6.7.EUS:apr-devel-0:1.3.9-5.el6_7.1.s390", "6ComputeNode-optional-6.7.EUS:apr-devel-0:1.3.9-5.el6_7.1.s390x", "6ComputeNode-optional-6.7.EUS:apr-devel-0:1.3.9-5.el6_7.1.x86_64", "6Server-6.4.AUS:apr-0:1.3.9-5.el6_4.1.i686", "6Server-6.4.AUS:apr-0:1.3.9-5.el6_4.1.src", "6Server-6.4.AUS:apr-0:1.3.9-5.el6_4.1.x86_64", "6Server-6.4.AUS:apr-debuginfo-0:1.3.9-5.el6_4.1.i686", "6Server-6.4.AUS:apr-debuginfo-0:1.3.9-5.el6_4.1.x86_64", "6Server-6.4.AUS:apr-devel-0:1.3.9-5.el6_4.1.i686", "6Server-6.4.AUS:apr-devel-0:1.3.9-5.el6_4.1.x86_64", "6Server-6.5.AUS:apr-0:1.3.9-5.el6_5.1.i686", "6Server-6.5.AUS:apr-0:1.3.9-5.el6_5.1.src", "6Server-6.5.AUS:apr-0:1.3.9-5.el6_5.1.x86_64", "6Server-6.5.AUS:apr-debuginfo-0:1.3.9-5.el6_5.1.i686", "6Server-6.5.AUS:apr-debuginfo-0:1.3.9-5.el6_5.1.x86_64", "6Server-6.5.AUS:apr-devel-0:1.3.9-5.el6_5.1.i686", "6Server-6.5.AUS:apr-devel-0:1.3.9-5.el6_5.1.x86_64", "6Server-6.6.AUS:apr-0:1.3.9-5.el6_6.1.i686", "6Server-6.6.AUS:apr-0:1.3.9-5.el6_6.1.src", "6Server-6.6.AUS:apr-0:1.3.9-5.el6_6.1.x86_64", "6Server-6.6.AUS:apr-debuginfo-0:1.3.9-5.el6_6.1.i686", "6Server-6.6.AUS:apr-debuginfo-0:1.3.9-5.el6_6.1.x86_64", "6Server-6.6.AUS:apr-devel-0:1.3.9-5.el6_6.1.i686", "6Server-6.6.AUS:apr-devel-0:1.3.9-5.el6_6.1.x86_64", "6Server-6.6.TUS:apr-0:1.3.9-5.el6_6.1.i686", "6Server-6.6.TUS:apr-0:1.3.9-5.el6_6.1.src", "6Server-6.6.TUS:apr-0:1.3.9-5.el6_6.1.x86_64", "6Server-6.6.TUS:apr-debuginfo-0:1.3.9-5.el6_6.1.i686", "6Server-6.6.TUS:apr-debuginfo-0:1.3.9-5.el6_6.1.x86_64", "6Server-6.6.TUS:apr-devel-0:1.3.9-5.el6_6.1.i686", "6Server-6.6.TUS:apr-devel-0:1.3.9-5.el6_6.1.x86_64", "6Server-6.7.EUS:apr-0:1.3.9-5.el6_7.1.i686", "6Server-6.7.EUS:apr-0:1.3.9-5.el6_7.1.ppc", "6Server-6.7.EUS:apr-0:1.3.9-5.el6_7.1.ppc64", "6Server-6.7.EUS:apr-0:1.3.9-5.el6_7.1.s390", "6Server-6.7.EUS:apr-0:1.3.9-5.el6_7.1.s390x", "6Server-6.7.EUS:apr-0:1.3.9-5.el6_7.1.src", "6Server-6.7.EUS:apr-0:1.3.9-5.el6_7.1.x86_64", "6Server-6.7.EUS:apr-debuginfo-0:1.3.9-5.el6_7.1.i686", "6Server-6.7.EUS:apr-debuginfo-0:1.3.9-5.el6_7.1.ppc", "6Server-6.7.EUS:apr-debuginfo-0:1.3.9-5.el6_7.1.ppc64", "6Server-6.7.EUS:apr-debuginfo-0:1.3.9-5.el6_7.1.s390", "6Server-6.7.EUS:apr-debuginfo-0:1.3.9-5.el6_7.1.s390x", "6Server-6.7.EUS:apr-debuginfo-0:1.3.9-5.el6_7.1.x86_64", "6Server-6.7.EUS:apr-devel-0:1.3.9-5.el6_7.1.i686", "6Server-6.7.EUS:apr-devel-0:1.3.9-5.el6_7.1.ppc", "6Server-6.7.EUS:apr-devel-0:1.3.9-5.el6_7.1.ppc64", "6Server-6.7.EUS:apr-devel-0:1.3.9-5.el6_7.1.s390", "6Server-6.7.EUS:apr-devel-0:1.3.9-5.el6_7.1.s390x", "6Server-6.7.EUS:apr-devel-0:1.3.9-5.el6_7.1.x86_64", "7ComputeNode-optional-7.3.EUS:apr-0:1.4.8-3.el7_3.1.i686", "7ComputeNode-optional-7.3.EUS:apr-0:1.4.8-3.el7_3.1.ppc", "7ComputeNode-optional-7.3.EUS:apr-0:1.4.8-3.el7_3.1.ppc64", "7ComputeNode-optional-7.3.EUS:apr-0:1.4.8-3.el7_3.1.ppc64le", "7ComputeNode-optional-7.3.EUS:apr-0:1.4.8-3.el7_3.1.s390", "7ComputeNode-optional-7.3.EUS:apr-0:1.4.8-3.el7_3.1.s390x", "7ComputeNode-optional-7.3.EUS:apr-0:1.4.8-3.el7_3.1.src", "7ComputeNode-optional-7.3.EUS:apr-0:1.4.8-3.el7_3.1.x86_64", "7ComputeNode-optional-7.3.EUS:apr-debuginfo-0:1.4.8-3.el7_3.1.i686", "7ComputeNode-optional-7.3.EUS:apr-debuginfo-0:1.4.8-3.el7_3.1.ppc", "7ComputeNode-optional-7.3.EUS:apr-debuginfo-0:1.4.8-3.el7_3.1.ppc64", "7ComputeNode-optional-7.3.EUS:apr-debuginfo-0:1.4.8-3.el7_3.1.ppc64le", "7ComputeNode-optional-7.3.EUS:apr-debuginfo-0:1.4.8-3.el7_3.1.s390", "7ComputeNode-optional-7.3.EUS:apr-debuginfo-0:1.4.8-3.el7_3.1.s390x", "7ComputeNode-optional-7.3.EUS:apr-debuginfo-0:1.4.8-3.el7_3.1.x86_64", "7ComputeNode-optional-7.3.EUS:apr-devel-0:1.4.8-3.el7_3.1.i686", "7ComputeNode-optional-7.3.EUS:apr-devel-0:1.4.8-3.el7_3.1.ppc", "7ComputeNode-optional-7.3.EUS:apr-devel-0:1.4.8-3.el7_3.1.ppc64", "7ComputeNode-optional-7.3.EUS:apr-devel-0:1.4.8-3.el7_3.1.ppc64le", "7ComputeNode-optional-7.3.EUS:apr-devel-0:1.4.8-3.el7_3.1.s390", "7ComputeNode-optional-7.3.EUS:apr-devel-0:1.4.8-3.el7_3.1.s390x", "7ComputeNode-optional-7.3.EUS:apr-devel-0:1.4.8-3.el7_3.1.x86_64", "7Server-7.2.AUS:apr-0:1.4.8-3.el7_2.1.i686", "7Server-7.2.AUS:apr-0:1.4.8-3.el7_2.1.src", "7Server-7.2.AUS:apr-0:1.4.8-3.el7_2.1.x86_64", "7Server-7.2.AUS:apr-debuginfo-0:1.4.8-3.el7_2.1.i686", "7Server-7.2.AUS:apr-debuginfo-0:1.4.8-3.el7_2.1.x86_64", "7Server-7.2.AUS:apr-devel-0:1.4.8-3.el7_2.1.i686", "7Server-7.2.AUS:apr-devel-0:1.4.8-3.el7_2.1.x86_64", "7Server-7.2.E4S:apr-0:1.4.8-3.el7_2.1.i686", "7Server-7.2.E4S:apr-0:1.4.8-3.el7_2.1.src", "7Server-7.2.E4S:apr-0:1.4.8-3.el7_2.1.x86_64", "7Server-7.2.E4S:apr-debuginfo-0:1.4.8-3.el7_2.1.i686", "7Server-7.2.E4S:apr-debuginfo-0:1.4.8-3.el7_2.1.x86_64", "7Server-7.2.E4S:apr-devel-0:1.4.8-3.el7_2.1.i686", "7Server-7.2.E4S:apr-devel-0:1.4.8-3.el7_2.1.x86_64", "7Server-7.2.TUS:apr-0:1.4.8-3.el7_2.1.i686", "7Server-7.2.TUS:apr-0:1.4.8-3.el7_2.1.src", "7Server-7.2.TUS:apr-0:1.4.8-3.el7_2.1.x86_64", "7Server-7.2.TUS:apr-debuginfo-0:1.4.8-3.el7_2.1.i686", "7Server-7.2.TUS:apr-debuginfo-0:1.4.8-3.el7_2.1.x86_64", "7Server-7.2.TUS:apr-devel-0:1.4.8-3.el7_2.1.i686", "7Server-7.2.TUS:apr-devel-0:1.4.8-3.el7_2.1.x86_64", "7Server-7.3.EUS:apr-0:1.4.8-3.el7_3.1.i686", "7Server-7.3.EUS:apr-0:1.4.8-3.el7_3.1.ppc", "7Server-7.3.EUS:apr-0:1.4.8-3.el7_3.1.ppc64", "7Server-7.3.EUS:apr-0:1.4.8-3.el7_3.1.ppc64le", "7Server-7.3.EUS:apr-0:1.4.8-3.el7_3.1.s390", "7Server-7.3.EUS:apr-0:1.4.8-3.el7_3.1.s390x", "7Server-7.3.EUS:apr-0:1.4.8-3.el7_3.1.src", "7Server-7.3.EUS:apr-0:1.4.8-3.el7_3.1.x86_64", "7Server-7.3.EUS:apr-debuginfo-0:1.4.8-3.el7_3.1.i686", "7Server-7.3.EUS:apr-debuginfo-0:1.4.8-3.el7_3.1.ppc", "7Server-7.3.EUS:apr-debuginfo-0:1.4.8-3.el7_3.1.ppc64", "7Server-7.3.EUS:apr-debuginfo-0:1.4.8-3.el7_3.1.ppc64le", "7Server-7.3.EUS:apr-debuginfo-0:1.4.8-3.el7_3.1.s390", "7Server-7.3.EUS:apr-debuginfo-0:1.4.8-3.el7_3.1.s390x", "7Server-7.3.EUS:apr-debuginfo-0:1.4.8-3.el7_3.1.x86_64", "7Server-7.3.EUS:apr-devel-0:1.4.8-3.el7_3.1.i686", "7Server-7.3.EUS:apr-devel-0:1.4.8-3.el7_3.1.ppc", "7Server-7.3.EUS:apr-devel-0:1.4.8-3.el7_3.1.ppc64", "7Server-7.3.EUS:apr-devel-0:1.4.8-3.el7_3.1.ppc64le", "7Server-7.3.EUS:apr-devel-0:1.4.8-3.el7_3.1.s390", "7Server-7.3.EUS:apr-devel-0:1.4.8-3.el7_3.1.s390x", "7Server-7.3.EUS:apr-devel-0:1.4.8-3.el7_3.1.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "apr: Out-of-bounds array deref in apr_time_exp*() functions" } ] }
rhsa-2018_0316
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for httpd24-apr is now available for Red Hat Software Collections.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "The Apache Portable Runtime (APR) is a portability library used by the Apache HTTP Server and other projects. It provides a free library of C data structures and routines.\n\nSecurity Fix(es):\n\n* An out-of-bounds array dereference was found in apr_time_exp_get(). An attacker could abuse an unvalidated usage of this function to cause a denial of service or potentially lead to data leak. (CVE-2017-12613)", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2018:0316", "url": "https://access.redhat.com/errata/RHSA-2018:0316" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "1506523", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1506523" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2018/rhsa-2018_0316.json" } ], "title": "Red Hat Security Advisory: httpd24-apr security update", "tracking": { "current_release_date": "2024-11-14T21:48:09+00:00", "generator": { "date": "2024-11-14T21:48:09+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2018:0316", "initial_release_date": "2018-02-13T17:19:19+00:00", "revision_history": [ { "date": "2018-02-13T17:19:19+00:00", "number": "1", "summary": "Initial version" }, { "date": "2018-02-13T17:19:19+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-14T21:48:09+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 6)", "product": { "name": "Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-RHSCL-3.0", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_software_collections:3::el6" } } }, { "category": "product_name", "name": "Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 6)", "product": { "name": "Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-RHSCL-3.0", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_software_collections:3::el6" } } }, { "category": "product_name", "name": "Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 6.7)", "product": { "name": "Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-RHSCL-3.0-6.7.Z", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_software_collections:3::el6" } } } ], "category": "product_family", "name": "Red Hat Software Collections" }, { "branches": [ { "category": "product_version", "name": "httpd24-apr-0:1.5.1-1.el6.1.x86_64", "product": { "name": "httpd24-apr-0:1.5.1-1.el6.1.x86_64", "product_id": "httpd24-apr-0:1.5.1-1.el6.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd24-apr@1.5.1-1.el6.1?arch=x86_64" } } }, { "category": "product_version", "name": "httpd24-apr-devel-0:1.5.1-1.el6.1.x86_64", "product": { "name": "httpd24-apr-devel-0:1.5.1-1.el6.1.x86_64", "product_id": "httpd24-apr-devel-0:1.5.1-1.el6.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd24-apr-devel@1.5.1-1.el6.1?arch=x86_64" } } }, { "category": "product_version", "name": "httpd24-apr-debuginfo-0:1.5.1-1.el6.1.x86_64", "product": { "name": "httpd24-apr-debuginfo-0:1.5.1-1.el6.1.x86_64", "product_id": "httpd24-apr-debuginfo-0:1.5.1-1.el6.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd24-apr-debuginfo@1.5.1-1.el6.1?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "httpd24-apr-0:1.5.1-1.el6.1.src", "product": { "name": "httpd24-apr-0:1.5.1-1.el6.1.src", "product_id": "httpd24-apr-0:1.5.1-1.el6.1.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd24-apr@1.5.1-1.el6.1?arch=src" } } } ], "category": "architecture", "name": "src" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "httpd24-apr-0:1.5.1-1.el6.1.src as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-RHSCL-3.0-6.7.Z:httpd24-apr-0:1.5.1-1.el6.1.src" }, "product_reference": "httpd24-apr-0:1.5.1-1.el6.1.src", "relates_to_product_reference": "6Server-RHSCL-3.0-6.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-apr-0:1.5.1-1.el6.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-RHSCL-3.0-6.7.Z:httpd24-apr-0:1.5.1-1.el6.1.x86_64" }, "product_reference": "httpd24-apr-0:1.5.1-1.el6.1.x86_64", "relates_to_product_reference": "6Server-RHSCL-3.0-6.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-apr-debuginfo-0:1.5.1-1.el6.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-RHSCL-3.0-6.7.Z:httpd24-apr-debuginfo-0:1.5.1-1.el6.1.x86_64" }, "product_reference": "httpd24-apr-debuginfo-0:1.5.1-1.el6.1.x86_64", "relates_to_product_reference": "6Server-RHSCL-3.0-6.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-apr-devel-0:1.5.1-1.el6.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-RHSCL-3.0-6.7.Z:httpd24-apr-devel-0:1.5.1-1.el6.1.x86_64" }, "product_reference": "httpd24-apr-devel-0:1.5.1-1.el6.1.x86_64", "relates_to_product_reference": "6Server-RHSCL-3.0-6.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-apr-0:1.5.1-1.el6.1.src as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-RHSCL-3.0:httpd24-apr-0:1.5.1-1.el6.1.src" }, "product_reference": "httpd24-apr-0:1.5.1-1.el6.1.src", "relates_to_product_reference": "6Server-RHSCL-3.0" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-apr-0:1.5.1-1.el6.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-RHSCL-3.0:httpd24-apr-0:1.5.1-1.el6.1.x86_64" }, "product_reference": "httpd24-apr-0:1.5.1-1.el6.1.x86_64", "relates_to_product_reference": "6Server-RHSCL-3.0" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-apr-debuginfo-0:1.5.1-1.el6.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-RHSCL-3.0:httpd24-apr-debuginfo-0:1.5.1-1.el6.1.x86_64" }, "product_reference": "httpd24-apr-debuginfo-0:1.5.1-1.el6.1.x86_64", "relates_to_product_reference": "6Server-RHSCL-3.0" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-apr-devel-0:1.5.1-1.el6.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-RHSCL-3.0:httpd24-apr-devel-0:1.5.1-1.el6.1.x86_64" }, "product_reference": "httpd24-apr-devel-0:1.5.1-1.el6.1.x86_64", "relates_to_product_reference": "6Server-RHSCL-3.0" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-apr-0:1.5.1-1.el6.1.src as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-RHSCL-3.0:httpd24-apr-0:1.5.1-1.el6.1.src" }, "product_reference": "httpd24-apr-0:1.5.1-1.el6.1.src", "relates_to_product_reference": "6Workstation-RHSCL-3.0" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-apr-0:1.5.1-1.el6.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-RHSCL-3.0:httpd24-apr-0:1.5.1-1.el6.1.x86_64" }, "product_reference": "httpd24-apr-0:1.5.1-1.el6.1.x86_64", "relates_to_product_reference": "6Workstation-RHSCL-3.0" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-apr-debuginfo-0:1.5.1-1.el6.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-RHSCL-3.0:httpd24-apr-debuginfo-0:1.5.1-1.el6.1.x86_64" }, "product_reference": "httpd24-apr-debuginfo-0:1.5.1-1.el6.1.x86_64", "relates_to_product_reference": "6Workstation-RHSCL-3.0" }, { "category": "default_component_of", "full_product_name": { "name": "httpd24-apr-devel-0:1.5.1-1.el6.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-RHSCL-3.0:httpd24-apr-devel-0:1.5.1-1.el6.1.x86_64" }, "product_reference": "httpd24-apr-devel-0:1.5.1-1.el6.1.x86_64", "relates_to_product_reference": "6Workstation-RHSCL-3.0" } ] }, "vulnerabilities": [ { "cve": "CVE-2017-12613", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "discovery_date": "2017-10-24T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1506523" } ], "notes": [ { "category": "description", "text": "An out-of-bounds array dereference was found in apr_time_exp_get(). An attacker could abuse an unvalidated usage of this function to cause a denial of service or potentially lead to data leak.", "title": "Vulnerability description" }, { "category": "summary", "text": "apr: Out-of-bounds array deref in apr_time_exp*() functions", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Server-RHSCL-3.0-6.7.Z:httpd24-apr-0:1.5.1-1.el6.1.src", "6Server-RHSCL-3.0-6.7.Z:httpd24-apr-0:1.5.1-1.el6.1.x86_64", "6Server-RHSCL-3.0-6.7.Z:httpd24-apr-debuginfo-0:1.5.1-1.el6.1.x86_64", "6Server-RHSCL-3.0-6.7.Z:httpd24-apr-devel-0:1.5.1-1.el6.1.x86_64", "6Server-RHSCL-3.0:httpd24-apr-0:1.5.1-1.el6.1.src", "6Server-RHSCL-3.0:httpd24-apr-0:1.5.1-1.el6.1.x86_64", "6Server-RHSCL-3.0:httpd24-apr-debuginfo-0:1.5.1-1.el6.1.x86_64", "6Server-RHSCL-3.0:httpd24-apr-devel-0:1.5.1-1.el6.1.x86_64", "6Workstation-RHSCL-3.0:httpd24-apr-0:1.5.1-1.el6.1.src", "6Workstation-RHSCL-3.0:httpd24-apr-0:1.5.1-1.el6.1.x86_64", "6Workstation-RHSCL-3.0:httpd24-apr-debuginfo-0:1.5.1-1.el6.1.x86_64", "6Workstation-RHSCL-3.0:httpd24-apr-devel-0:1.5.1-1.el6.1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2017-12613" }, { "category": "external", "summary": "RHBZ#1506523", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1506523" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2017-12613", "url": "https://www.cve.org/CVERecord?id=CVE-2017-12613" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-12613", "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-12613" }, { "category": "external", "summary": "http://www.apache.org/dist/apr/Announcement1.x.html", "url": "http://www.apache.org/dist/apr/Announcement1.x.html" } ], "release_date": "2017-10-23T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-02-13T17:19:19+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nApplications using the APR libraries, such as httpd, must be restarted for this update to take effect.", "product_ids": [ "6Server-RHSCL-3.0-6.7.Z:httpd24-apr-0:1.5.1-1.el6.1.src", "6Server-RHSCL-3.0-6.7.Z:httpd24-apr-0:1.5.1-1.el6.1.x86_64", "6Server-RHSCL-3.0-6.7.Z:httpd24-apr-debuginfo-0:1.5.1-1.el6.1.x86_64", "6Server-RHSCL-3.0-6.7.Z:httpd24-apr-devel-0:1.5.1-1.el6.1.x86_64", "6Server-RHSCL-3.0:httpd24-apr-0:1.5.1-1.el6.1.src", "6Server-RHSCL-3.0:httpd24-apr-0:1.5.1-1.el6.1.x86_64", "6Server-RHSCL-3.0:httpd24-apr-debuginfo-0:1.5.1-1.el6.1.x86_64", "6Server-RHSCL-3.0:httpd24-apr-devel-0:1.5.1-1.el6.1.x86_64", "6Workstation-RHSCL-3.0:httpd24-apr-0:1.5.1-1.el6.1.src", "6Workstation-RHSCL-3.0:httpd24-apr-0:1.5.1-1.el6.1.x86_64", "6Workstation-RHSCL-3.0:httpd24-apr-debuginfo-0:1.5.1-1.el6.1.x86_64", "6Workstation-RHSCL-3.0:httpd24-apr-devel-0:1.5.1-1.el6.1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2018:0316" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.4, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H", "version": "3.0" }, "products": [ "6Server-RHSCL-3.0-6.7.Z:httpd24-apr-0:1.5.1-1.el6.1.src", "6Server-RHSCL-3.0-6.7.Z:httpd24-apr-0:1.5.1-1.el6.1.x86_64", "6Server-RHSCL-3.0-6.7.Z:httpd24-apr-debuginfo-0:1.5.1-1.el6.1.x86_64", "6Server-RHSCL-3.0-6.7.Z:httpd24-apr-devel-0:1.5.1-1.el6.1.x86_64", "6Server-RHSCL-3.0:httpd24-apr-0:1.5.1-1.el6.1.src", "6Server-RHSCL-3.0:httpd24-apr-0:1.5.1-1.el6.1.x86_64", "6Server-RHSCL-3.0:httpd24-apr-debuginfo-0:1.5.1-1.el6.1.x86_64", "6Server-RHSCL-3.0:httpd24-apr-devel-0:1.5.1-1.el6.1.x86_64", "6Workstation-RHSCL-3.0:httpd24-apr-0:1.5.1-1.el6.1.src", "6Workstation-RHSCL-3.0:httpd24-apr-0:1.5.1-1.el6.1.x86_64", "6Workstation-RHSCL-3.0:httpd24-apr-debuginfo-0:1.5.1-1.el6.1.x86_64", "6Workstation-RHSCL-3.0:httpd24-apr-devel-0:1.5.1-1.el6.1.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "apr: Out-of-bounds array deref in apr_time_exp*() functions" } ] }
wid-sec-w-2023-1594
Vulnerability from csaf_certbund
Notes
{ "document": { "aggregate_severity": { "text": "hoch" }, "category": "csaf_base", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "de-DE", "notes": [ { "category": "legal_disclaimer", "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen." }, { "category": "description", "text": "IBM Tivoli Network Manager ist eine Netzanalysesoftware f\u00fcr das Management komplexer Netze. Diese Software erfasst und verteilt Layer-2- und Layer-3-Netzdaten.", "title": "Produktbeschreibung" }, { "category": "summary", "text": "Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann mehrere Schwachstellen in IBM Tivoli Network Manager ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien auszuweiten, Daten zu manipulieren, nicht spezifizierte Auswirkungen zu verursachen und einen Cross-Site-Scripting-Angriff durchzuf\u00fchren.", "title": "Angriff" }, { "category": "general", "text": "- UNIX\n- Linux\n- Windows\n- Sonstiges", "title": "Betroffene Betriebssysteme" } ], "publisher": { "category": "other", "contact_details": "csaf-provider@cert-bund.de", "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik", "namespace": "https://www.bsi.bund.de" }, "references": [ { "category": "self", "summary": "WID-SEC-W-2023-1594 - CSAF Version", "url": "https://wid.cert-bund.de/.well-known/csaf/white/2023/wid-sec-w-2023-1594.json" }, { "category": "self", "summary": "WID-SEC-2023-1594 - Portal Version", "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2023-1594" }, { "category": "external", "summary": "IBM Security Advisory vom 2023-06-28", "url": "https://www.ibm.com/support/pages/node/885316" }, { "category": "external", "summary": "IBM Security Advisory vom 2023-06-28", "url": "https://www.ibm.com/support/pages/node/884276" }, { "category": "external", "summary": "IBM Security Advisory vom 2023-06-28", "url": "https://www.ibm.com/support/pages/node/883428" }, { "category": "external", "summary": "IBM Security Advisory vom 2023-06-28", "url": "https://www.ibm.com/support/pages/node/883424" }, { "category": "external", "summary": "IBM Security Advisory vom 2023-06-28", "url": "https://www.ibm.com/support/pages/node/882926" }, { "category": "external", "summary": "IBM Security Advisory vom 2023-06-28", "url": "https://www.ibm.com/support/pages/node/882898" }, { "category": "external", "summary": "IBM Security Advisory vom 2023-06-28", "url": "https://www.ibm.com/support/pages/node/882888" }, { "category": "external", "summary": "IBM Security Advisory vom 2023-06-28", "url": "https://www.ibm.com/support/pages/node/880403" }, { "category": "external", "summary": "IBM Security Advisory vom 2023-06-28", "url": "https://www.ibm.com/support/pages/node/880401" }, { "category": "external", "summary": "IBM Security Advisory vom 2023-06-28", "url": "https://www.ibm.com/support/pages/node/880395" }, { "category": "external", "summary": "IBM Security Advisory vom 2023-06-28", "url": "https://www.ibm.com/support/pages/node/879855" }, { "category": "external", "summary": "IBM Security Advisory vom 2023-06-28", "url": "https://www.ibm.com/support/pages/node/879841" }, { "category": "external", "summary": "IBM Security Advisory vom 2023-06-28", "url": "https://www.ibm.com/support/pages/node/870546" }, { "category": "external", "summary": "IBM Security Advisory vom 2023-06-28", "url": "https://www.ibm.com/support/pages/node/870526" }, { "category": "external", "summary": "IBM Security Advisory vom 2023-06-28", "url": "https://www.ibm.com/support/pages/node/870508" }, { "category": "external", "summary": "IBM Security Advisory vom 2023-06-28", "url": "https://www.ibm.com/support/pages/node/870504" }, { "category": "external", "summary": "IBM Security Advisory vom 2023-06-28", "url": "https://www.ibm.com/support/pages/node/870500" }, { "category": "external", "summary": "IBM Security Advisory vom 2023-06-28", "url": "https://www.ibm.com/support/pages/node/870498" }, { "category": "external", "summary": "IBM Security Advisory vom 2023-06-28", "url": "https://www.ibm.com/support/pages/node/743933" }, { "category": "external", "summary": "IBM Security Advisory vom 2023-06-28", "url": "https://www.ibm.com/support/pages/node/739297" }, { "category": "external", "summary": "IBM Security Advisory vom 2023-06-28", "url": "https://www.ibm.com/support/pages/node/739271" }, { "category": "external", "summary": "IBM Security Advisory vom 2023-06-28", "url": "https://www.ibm.com/support/pages/node/739249" }, { "category": "external", "summary": "IBM Security Advisory vom 2023-06-28", "url": "https://www.ibm.com/support/pages/node/739247" }, { "category": "external", "summary": "IBM Security Advisory vom 2023-06-28", "url": "https://www.ibm.com/support/pages/node/739245" }, { "category": "external", "summary": "IBM Security Advisory vom 2023-06-28", "url": "https://www.ibm.com/support/pages/node/739243" }, { "category": "external", "summary": "IBM Security Advisory vom 2023-06-28", "url": "https://www.ibm.com/support/pages/node/738231" }, { "category": "external", "summary": "IBM Security Advisory vom 2023-06-28", "url": "https://www.ibm.com/support/pages/node/731931" }, { "category": "external", "summary": "IBM Security Advisory vom 2023-06-28", "url": "https://www.ibm.com/support/pages/node/730883" }, { "category": "external", "summary": "IBM Security Advisory vom 2023-06-28", "url": "https://www.ibm.com/support/pages/node/730871" }, { "category": "external", "summary": "IBM Security Advisory vom 2023-06-28", "url": "https://www.ibm.com/support/pages/node/730845" }, { "category": "external", "summary": "IBM Security Advisory vom 2023-06-28", "url": "https://www.ibm.com/support/pages/node/730835" }, { "category": "external", "summary": "IBM Security Advisory vom 2023-06-28", "url": "https://www.ibm.com/support/pages/node/730171" }, { "category": "external", "summary": "IBM Security Advisory vom 2023-06-28", "url": "https://www.ibm.com/support/pages/node/720307" }, { "category": "external", "summary": "IBM Security Advisory vom 2023-06-28", "url": "https://www.ibm.com/support/pages/node/720283" }, { "category": "external", "summary": "IBM Security Advisory vom 2023-06-28", "url": "https://www.ibm.com/support/pages/node/720265" }, { "category": "external", "summary": "IBM Security Advisory vom 2023-06-28", "url": "https://www.ibm.com/support/pages/node/718745" }, { "category": "external", "summary": "IBM Security Advisory vom 2023-06-28", "url": "https://www.ibm.com/support/pages/node/717345" }, { "category": "external", "summary": "IBM Security Advisory vom 2023-06-28", "url": "https://www.ibm.com/support/pages/node/717335" }, { "category": "external", "summary": "IBM Security Advisory vom 2023-06-28", "url": "https://www.ibm.com/support/pages/node/717327" }, { "category": "external", "summary": "IBM Security Advisory vom 2023-06-28", "url": "https://www.ibm.com/support/pages/node/717007" }, { "category": "external", "summary": "IBM Security Advisory vom 2023-06-28", "url": "https://www.ibm.com/support/pages/node/716573" }, { "category": "external", "summary": "IBM Security Advisory vom 2023-06-28", "url": "https://www.ibm.com/support/pages/node/712213" }, { "category": "external", "summary": "IBM Security Advisory vom 2023-06-28", "url": "https://www.ibm.com/support/pages/node/712199" }, { "category": "external", "summary": "IBM Security Advisory vom 2023-06-28", "url": "https://www.ibm.com/support/pages/node/570557" }, { "category": "external", "summary": "IBM Security Advisory vom 2023-06-28", "url": "https://www.ibm.com/support/pages/node/569765" }, { "category": "external", "summary": "IBM Security Advisory vom 2023-06-28", "url": "https://www.ibm.com/support/pages/node/569727" }, { "category": "external", "summary": "IBM Security Advisory vom 2023-06-28", "url": "https://www.ibm.com/support/pages/node/569717" }, { "category": "external", "summary": "IBM Security Advisory vom 2023-06-28", "url": "https://www.ibm.com/support/pages/node/305321" }, { "category": "external", "summary": "IBM Security Advisory vom 2023-06-28", "url": "https://www.ibm.com/support/pages/node/304091" }, { "category": "external", "summary": "IBM Security Advisory vom 2023-06-28", "url": "https://www.ibm.com/support/pages/node/304089" }, { "category": "external", "summary": "IBM Security Advisory vom 2023-06-28", "url": "https://www.ibm.com/support/pages/node/303663" }, { "category": "external", "summary": "IBM Security Advisory vom 2023-06-28", "url": "https://www.ibm.com/support/pages/node/303657" } ], "source_lang": "en-US", "title": "IBM Tivoli Network Manager: Mehrere Schwachstellen", "tracking": { "current_release_date": "2023-06-28T22:00:00.000+00:00", "generator": { "date": "2024-02-15T17:33:19.626+00:00", "engine": { "name": "BSI-WID", "version": "1.3.0" } }, "id": "WID-SEC-W-2023-1594", "initial_release_date": "2023-06-28T22:00:00.000+00:00", "revision_history": [ { "date": "2023-06-28T22:00:00.000+00:00", "number": "1", "summary": "Initiale Fassung" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "IBM Tivoli Network Manager IP Edition \u003c 3.9 Fix Pack 5", "product": { "name": "IBM Tivoli Network Manager IP Edition \u003c 3.9 Fix Pack 5", "product_id": "T028343", "product_identification_helper": { "cpe": "cpe:/a:ibm:tivoli_network_manager:ip_edition__3.9_fix_pack_5" } } }, { "category": "product_name", "name": "IBM Tivoli Network Manager IP Edition \u003c 3.9", "product": { "name": "IBM Tivoli Network Manager IP Edition \u003c 3.9", "product_id": "T028344", "product_identification_helper": { "cpe": "cpe:/a:ibm:tivoli_network_manager:ip_edition__3.9" } } }, { "category": "product_name", "name": "IBM Tivoli Network Manager IP Edition \u003c 4.1.1", "product": { "name": "IBM Tivoli Network Manager IP Edition \u003c 4.1.1", "product_id": "T028345", "product_identification_helper": { "cpe": "cpe:/a:ibm:tivoli_network_manager:ip_edition__4.1.1" } } }, { "category": "product_name", "name": "IBM Tivoli Network Manager IP Edition \u003c 4.2", "product": { "name": "IBM Tivoli Network Manager IP Edition \u003c 4.2", "product_id": "T028346", "product_identification_helper": { "cpe": "cpe:/a:ibm:tivoli_network_manager:ip_edition__4.2" } } }, { "category": "product_name", "name": "IBM Tivoli Network Manager IP Edition \u003c 3.9.0.4", "product": { "name": "IBM Tivoli Network Manager IP Edition \u003c 3.9.0.4", "product_id": "T028347", "product_identification_helper": { "cpe": "cpe:/a:ibm:tivoli_network_manager:ip_edition__3.9.0.4" } } }, { "category": "product_name", "name": "IBM Tivoli Network Manager IP Edition \u003c 3.9.0.5", "product": { "name": "IBM Tivoli Network Manager IP Edition \u003c 3.9.0.5", "product_id": "T028348", "product_identification_helper": { "cpe": "cpe:/a:ibm:tivoli_network_manager:ip_edition__3.9.0.5" } } }, { "category": "product_name", "name": "IBM Tivoli Network Manager IP Edition \u003c 3.9 Fix Pack 4", "product": { "name": "IBM Tivoli Network Manager IP Edition \u003c 3.9 Fix Pack 4", "product_id": "T028349", "product_identification_helper": { "cpe": "cpe:/a:ibm:tivoli_network_manager:ip_edition__3.9_fix_pack_4" } } } ], "category": "product_name", "name": "Tivoli Network Manager" } ], "category": "vendor", "name": "IBM" } ] }, "vulnerabilities": [ { "cve": "CVE-2019-4046", "notes": [ { "category": "description", "text": "In IBM Tivoli Network Manager existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in den Komponenten OpenSSL, Apache CXF, Apache HTTPD, Oracle MySQL, Apache Commons, Apache Struts, IBM GSKit, Java SDK, Eclipse OpenJ9 und SAML. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien auszuweiten, Daten zu manipulieren, nicht spezifizierte Auswirkungen zu verursachen und einen Cross-Site-Scripting-Angriff durchzuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Berechtigungen." } ], "release_date": "2023-06-28T22:00:00Z", "title": "CVE-2019-4046" }, { "cve": "CVE-2019-4030", "notes": [ { "category": "description", "text": "In IBM Tivoli Network Manager existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in den Komponenten OpenSSL, Apache CXF, Apache HTTPD, Oracle MySQL, Apache Commons, Apache Struts, IBM GSKit, Java SDK, Eclipse OpenJ9 und SAML. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien auszuweiten, Daten zu manipulieren, nicht spezifizierte Auswirkungen zu verursachen und einen Cross-Site-Scripting-Angriff durchzuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Berechtigungen." } ], "release_date": "2023-06-28T22:00:00Z", "title": "CVE-2019-4030" }, { "cve": "CVE-2019-2684", "notes": [ { "category": "description", "text": "In IBM Tivoli Network Manager existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in den Komponenten OpenSSL, Apache CXF, Apache HTTPD, Oracle MySQL, Apache Commons, Apache Struts, IBM GSKit, Java SDK, Eclipse OpenJ9 und SAML. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien auszuweiten, Daten zu manipulieren, nicht spezifizierte Auswirkungen zu verursachen und einen Cross-Site-Scripting-Angriff durchzuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Berechtigungen." } ], "release_date": "2023-06-28T22:00:00Z", "title": "CVE-2019-2684" }, { "cve": "CVE-2019-2602", "notes": [ { "category": "description", "text": "In IBM Tivoli Network Manager existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in den Komponenten OpenSSL, Apache CXF, Apache HTTPD, Oracle MySQL, Apache Commons, Apache Struts, IBM GSKit, Java SDK, Eclipse OpenJ9 und SAML. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien auszuweiten, Daten zu manipulieren, nicht spezifizierte Auswirkungen zu verursachen und einen Cross-Site-Scripting-Angriff durchzuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Berechtigungen." } ], "release_date": "2023-06-28T22:00:00Z", "title": "CVE-2019-2602" }, { "cve": "CVE-2019-2537", "notes": [ { "category": "description", "text": "In IBM Tivoli Network Manager existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in den Komponenten OpenSSL, Apache CXF, Apache HTTPD, Oracle MySQL, Apache Commons, Apache Struts, IBM GSKit, Java SDK, Eclipse OpenJ9 und SAML. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien auszuweiten, Daten zu manipulieren, nicht spezifizierte Auswirkungen zu verursachen und einen Cross-Site-Scripting-Angriff durchzuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Berechtigungen." } ], "release_date": "2023-06-28T22:00:00Z", "title": "CVE-2019-2537" }, { "cve": "CVE-2019-2534", "notes": [ { "category": "description", "text": "In IBM Tivoli Network Manager existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in den Komponenten OpenSSL, Apache CXF, Apache HTTPD, Oracle MySQL, Apache Commons, Apache Struts, IBM GSKit, Java SDK, Eclipse OpenJ9 und SAML. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien auszuweiten, Daten zu manipulieren, nicht spezifizierte Auswirkungen zu verursachen und einen Cross-Site-Scripting-Angriff durchzuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Berechtigungen." } ], "release_date": "2023-06-28T22:00:00Z", "title": "CVE-2019-2534" }, { "cve": "CVE-2019-2531", "notes": [ { "category": "description", "text": "In IBM Tivoli Network Manager existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in den Komponenten OpenSSL, Apache CXF, Apache HTTPD, Oracle MySQL, Apache Commons, Apache Struts, IBM GSKit, Java SDK, Eclipse OpenJ9 und SAML. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien auszuweiten, Daten zu manipulieren, nicht spezifizierte Auswirkungen zu verursachen und einen Cross-Site-Scripting-Angriff durchzuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Berechtigungen." } ], "release_date": "2023-06-28T22:00:00Z", "title": "CVE-2019-2531" }, { "cve": "CVE-2019-2529", "notes": [ { "category": "description", "text": "In IBM Tivoli Network Manager existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in den Komponenten OpenSSL, Apache CXF, Apache HTTPD, Oracle MySQL, Apache Commons, Apache Struts, IBM GSKit, Java SDK, Eclipse OpenJ9 und SAML. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien auszuweiten, Daten zu manipulieren, nicht spezifizierte Auswirkungen zu verursachen und einen Cross-Site-Scripting-Angriff durchzuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Berechtigungen." } ], "release_date": "2023-06-28T22:00:00Z", "title": "CVE-2019-2529" }, { "cve": "CVE-2019-2503", "notes": [ { "category": "description", "text": "In IBM Tivoli Network Manager existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in den Komponenten OpenSSL, Apache CXF, Apache HTTPD, Oracle MySQL, Apache Commons, Apache Struts, IBM GSKit, Java SDK, Eclipse OpenJ9 und SAML. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien auszuweiten, Daten zu manipulieren, nicht spezifizierte Auswirkungen zu verursachen und einen Cross-Site-Scripting-Angriff durchzuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Berechtigungen." } ], "release_date": "2023-06-28T22:00:00Z", "title": "CVE-2019-2503" }, { "cve": "CVE-2019-2482", "notes": [ { "category": "description", "text": "In IBM Tivoli Network Manager existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in den Komponenten OpenSSL, Apache CXF, Apache HTTPD, Oracle MySQL, Apache Commons, Apache Struts, IBM GSKit, Java SDK, Eclipse OpenJ9 und SAML. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien auszuweiten, Daten zu manipulieren, nicht spezifizierte Auswirkungen zu verursachen und einen Cross-Site-Scripting-Angriff durchzuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Berechtigungen." } ], "release_date": "2023-06-28T22:00:00Z", "title": "CVE-2019-2482" }, { "cve": "CVE-2019-2481", "notes": [ { "category": "description", "text": "In IBM Tivoli Network Manager existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in den Komponenten OpenSSL, Apache CXF, Apache HTTPD, Oracle MySQL, Apache Commons, Apache Struts, IBM GSKit, Java SDK, Eclipse OpenJ9 und SAML. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien auszuweiten, Daten zu manipulieren, nicht spezifizierte Auswirkungen zu verursachen und einen Cross-Site-Scripting-Angriff durchzuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Berechtigungen." } ], "release_date": "2023-06-28T22:00:00Z", "title": "CVE-2019-2481" }, { "cve": "CVE-2019-2455", "notes": [ { "category": "description", "text": "In IBM Tivoli Network Manager existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in den Komponenten OpenSSL, Apache CXF, Apache HTTPD, Oracle MySQL, Apache Commons, Apache Struts, IBM GSKit, Java SDK, Eclipse OpenJ9 und SAML. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien auszuweiten, Daten zu manipulieren, nicht spezifizierte Auswirkungen zu verursachen und einen Cross-Site-Scripting-Angriff durchzuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Berechtigungen." } ], "release_date": "2023-06-28T22:00:00Z", "title": "CVE-2019-2455" }, { "cve": "CVE-2019-1559", "notes": [ { "category": "description", "text": "In IBM Tivoli Network Manager existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in den Komponenten OpenSSL, Apache CXF, Apache HTTPD, Oracle MySQL, Apache Commons, Apache Struts, IBM GSKit, Java SDK, Eclipse OpenJ9 und SAML. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien auszuweiten, Daten zu manipulieren, nicht spezifizierte Auswirkungen zu verursachen und einen Cross-Site-Scripting-Angriff durchzuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Berechtigungen." } ], "release_date": "2023-06-28T22:00:00Z", "title": "CVE-2019-1559" }, { "cve": "CVE-2019-0220", "notes": [ { "category": "description", "text": "In IBM Tivoli Network Manager existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in den Komponenten OpenSSL, Apache CXF, Apache HTTPD, Oracle MySQL, Apache Commons, Apache Struts, IBM GSKit, Java SDK, Eclipse OpenJ9 und SAML. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien auszuweiten, Daten zu manipulieren, nicht spezifizierte Auswirkungen zu verursachen und einen Cross-Site-Scripting-Angriff durchzuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Berechtigungen." } ], "release_date": "2023-06-28T22:00:00Z", "title": "CVE-2019-0220" }, { "cve": "CVE-2018-8039", "notes": [ { "category": "description", "text": "In IBM Tivoli Network Manager existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in den Komponenten OpenSSL, Apache CXF, Apache HTTPD, Oracle MySQL, Apache Commons, Apache Struts, IBM GSKit, Java SDK, Eclipse OpenJ9 und SAML. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien auszuweiten, Daten zu manipulieren, nicht spezifizierte Auswirkungen zu verursachen und einen Cross-Site-Scripting-Angriff durchzuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Berechtigungen." } ], "release_date": "2023-06-28T22:00:00Z", "title": "CVE-2018-8039" }, { "cve": "CVE-2018-5407", "notes": [ { "category": "description", "text": "In IBM Tivoli Network Manager existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in den Komponenten OpenSSL, Apache CXF, Apache HTTPD, Oracle MySQL, Apache Commons, Apache Struts, IBM GSKit, Java SDK, Eclipse OpenJ9 und SAML. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien auszuweiten, Daten zu manipulieren, nicht spezifizierte Auswirkungen zu verursachen und einen Cross-Site-Scripting-Angriff durchzuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Berechtigungen." } ], "release_date": "2023-06-28T22:00:00Z", "title": "CVE-2018-5407" }, { "cve": "CVE-2018-3282", "notes": [ { "category": "description", "text": "In IBM Tivoli Network Manager existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in den Komponenten OpenSSL, Apache CXF, Apache HTTPD, Oracle MySQL, Apache Commons, Apache Struts, IBM GSKit, Java SDK, Eclipse OpenJ9 und SAML. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien auszuweiten, Daten zu manipulieren, nicht spezifizierte Auswirkungen zu verursachen und einen Cross-Site-Scripting-Angriff durchzuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Berechtigungen." } ], "release_date": "2023-06-28T22:00:00Z", "title": "CVE-2018-3282" }, { "cve": "CVE-2018-3278", "notes": [ { "category": "description", "text": "In IBM Tivoli Network Manager existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in den Komponenten OpenSSL, Apache CXF, Apache HTTPD, Oracle MySQL, Apache Commons, Apache Struts, IBM GSKit, Java SDK, Eclipse OpenJ9 und SAML. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien auszuweiten, Daten zu manipulieren, nicht spezifizierte Auswirkungen zu verursachen und einen Cross-Site-Scripting-Angriff durchzuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Berechtigungen." } ], "release_date": "2023-06-28T22:00:00Z", "title": "CVE-2018-3278" }, { "cve": "CVE-2018-3276", "notes": [ { "category": "description", "text": "In IBM Tivoli Network Manager existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in den Komponenten OpenSSL, Apache CXF, Apache HTTPD, Oracle MySQL, Apache Commons, Apache Struts, IBM GSKit, Java SDK, Eclipse OpenJ9 und SAML. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien auszuweiten, Daten zu manipulieren, nicht spezifizierte Auswirkungen zu verursachen und einen Cross-Site-Scripting-Angriff durchzuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Berechtigungen." } ], "release_date": "2023-06-28T22:00:00Z", "title": "CVE-2018-3276" }, { "cve": "CVE-2018-3251", "notes": [ { "category": "description", "text": "In IBM Tivoli Network Manager existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in den Komponenten OpenSSL, Apache CXF, Apache HTTPD, Oracle MySQL, Apache Commons, Apache Struts, IBM GSKit, Java SDK, Eclipse OpenJ9 und SAML. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien auszuweiten, Daten zu manipulieren, nicht spezifizierte Auswirkungen zu verursachen und einen Cross-Site-Scripting-Angriff durchzuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Berechtigungen." } ], "release_date": "2023-06-28T22:00:00Z", "title": "CVE-2018-3251" }, { "cve": "CVE-2018-3247", "notes": [ { "category": "description", "text": "In IBM Tivoli Network Manager existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in den Komponenten OpenSSL, Apache CXF, Apache HTTPD, Oracle MySQL, Apache Commons, Apache Struts, IBM GSKit, Java SDK, Eclipse OpenJ9 und SAML. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien auszuweiten, Daten zu manipulieren, nicht spezifizierte Auswirkungen zu verursachen und einen Cross-Site-Scripting-Angriff durchzuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Berechtigungen." } ], "release_date": "2023-06-28T22:00:00Z", "title": "CVE-2018-3247" }, { "cve": "CVE-2018-3174", "notes": [ { "category": "description", "text": "In IBM Tivoli Network Manager existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in den Komponenten OpenSSL, Apache CXF, Apache HTTPD, Oracle MySQL, Apache Commons, Apache Struts, IBM GSKit, Java SDK, Eclipse OpenJ9 und SAML. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien auszuweiten, Daten zu manipulieren, nicht spezifizierte Auswirkungen zu verursachen und einen Cross-Site-Scripting-Angriff durchzuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Berechtigungen." } ], "release_date": "2023-06-28T22:00:00Z", "title": "CVE-2018-3174" }, { "cve": "CVE-2018-3156", "notes": [ { "category": "description", "text": "In IBM Tivoli Network Manager existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in den Komponenten OpenSSL, Apache CXF, Apache HTTPD, Oracle MySQL, Apache Commons, Apache Struts, IBM GSKit, Java SDK, Eclipse OpenJ9 und SAML. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien auszuweiten, Daten zu manipulieren, nicht spezifizierte Auswirkungen zu verursachen und einen Cross-Site-Scripting-Angriff durchzuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Berechtigungen." } ], "release_date": "2023-06-28T22:00:00Z", "title": "CVE-2018-3156" }, { "cve": "CVE-2018-3143", "notes": [ { "category": "description", "text": "In IBM Tivoli Network Manager existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in den Komponenten OpenSSL, Apache CXF, Apache HTTPD, Oracle MySQL, Apache Commons, Apache Struts, IBM GSKit, Java SDK, Eclipse OpenJ9 und SAML. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien auszuweiten, Daten zu manipulieren, nicht spezifizierte Auswirkungen zu verursachen und einen Cross-Site-Scripting-Angriff durchzuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Berechtigungen." } ], "release_date": "2023-06-28T22:00:00Z", "title": "CVE-2018-3143" }, { "cve": "CVE-2018-3123", "notes": [ { "category": "description", "text": "In IBM Tivoli Network Manager existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in den Komponenten OpenSSL, Apache CXF, Apache HTTPD, Oracle MySQL, Apache Commons, Apache Struts, IBM GSKit, Java SDK, Eclipse OpenJ9 und SAML. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien auszuweiten, Daten zu manipulieren, nicht spezifizierte Auswirkungen zu verursachen und einen Cross-Site-Scripting-Angriff durchzuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Berechtigungen." } ], "release_date": "2023-06-28T22:00:00Z", "title": "CVE-2018-3123" }, { "cve": "CVE-2018-3084", "notes": [ { "category": "description", "text": "In IBM Tivoli Network Manager existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in den Komponenten OpenSSL, Apache CXF, Apache HTTPD, Oracle MySQL, Apache Commons, Apache Struts, IBM GSKit, Java SDK, Eclipse OpenJ9 und SAML. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien auszuweiten, Daten zu manipulieren, nicht spezifizierte Auswirkungen zu verursachen und einen Cross-Site-Scripting-Angriff durchzuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Berechtigungen." } ], "release_date": "2023-06-28T22:00:00Z", "title": "CVE-2018-3084" }, { "cve": "CVE-2018-3082", "notes": [ { "category": "description", "text": "In IBM Tivoli Network Manager existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in den Komponenten OpenSSL, Apache CXF, Apache HTTPD, Oracle MySQL, Apache Commons, Apache Struts, IBM GSKit, Java SDK, Eclipse OpenJ9 und SAML. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien auszuweiten, Daten zu manipulieren, nicht spezifizierte Auswirkungen zu verursachen und einen Cross-Site-Scripting-Angriff durchzuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Berechtigungen." } ], "release_date": "2023-06-28T22:00:00Z", "title": "CVE-2018-3082" }, { "cve": "CVE-2018-3081", "notes": [ { "category": "description", "text": "In IBM Tivoli Network Manager existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in den Komponenten OpenSSL, Apache CXF, Apache HTTPD, Oracle MySQL, Apache Commons, Apache Struts, IBM GSKit, Java SDK, Eclipse OpenJ9 und SAML. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien auszuweiten, Daten zu manipulieren, nicht spezifizierte Auswirkungen zu verursachen und einen Cross-Site-Scripting-Angriff durchzuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Berechtigungen." } ], "release_date": "2023-06-28T22:00:00Z", "title": "CVE-2018-3081" }, { "cve": "CVE-2018-3080", "notes": [ { "category": "description", "text": "In IBM Tivoli Network Manager existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in den Komponenten OpenSSL, Apache CXF, Apache HTTPD, Oracle MySQL, Apache Commons, Apache Struts, IBM GSKit, Java SDK, Eclipse OpenJ9 und SAML. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien auszuweiten, Daten zu manipulieren, nicht spezifizierte Auswirkungen zu verursachen und einen Cross-Site-Scripting-Angriff durchzuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Berechtigungen." } ], "release_date": "2023-06-28T22:00:00Z", "title": "CVE-2018-3080" }, { "cve": "CVE-2018-3079", "notes": [ { "category": "description", "text": "In IBM Tivoli Network Manager existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in den Komponenten OpenSSL, Apache CXF, Apache HTTPD, Oracle MySQL, Apache Commons, Apache Struts, IBM GSKit, Java SDK, Eclipse OpenJ9 und SAML. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien auszuweiten, Daten zu manipulieren, nicht spezifizierte Auswirkungen zu verursachen und einen Cross-Site-Scripting-Angriff durchzuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Berechtigungen." } ], "release_date": "2023-06-28T22:00:00Z", "title": "CVE-2018-3079" }, { "cve": "CVE-2018-3078", "notes": [ { "category": "description", "text": "In IBM Tivoli Network Manager existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in den Komponenten OpenSSL, Apache CXF, Apache HTTPD, Oracle MySQL, Apache Commons, Apache Struts, IBM GSKit, Java SDK, Eclipse OpenJ9 und SAML. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien auszuweiten, Daten zu manipulieren, nicht spezifizierte Auswirkungen zu verursachen und einen Cross-Site-Scripting-Angriff durchzuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Berechtigungen." } ], "release_date": "2023-06-28T22:00:00Z", "title": "CVE-2018-3078" }, { "cve": "CVE-2018-3077", "notes": [ { "category": "description", "text": "In IBM Tivoli Network Manager existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in den Komponenten OpenSSL, Apache CXF, Apache HTTPD, Oracle MySQL, Apache Commons, Apache Struts, IBM GSKit, Java SDK, Eclipse OpenJ9 und SAML. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien auszuweiten, Daten zu manipulieren, nicht spezifizierte Auswirkungen zu verursachen und einen Cross-Site-Scripting-Angriff durchzuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Berechtigungen." } ], "release_date": "2023-06-28T22:00:00Z", "title": "CVE-2018-3077" }, { "cve": "CVE-2018-3075", "notes": [ { "category": "description", "text": "In IBM Tivoli Network Manager existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in den Komponenten OpenSSL, Apache CXF, Apache HTTPD, Oracle MySQL, Apache Commons, Apache Struts, IBM GSKit, Java SDK, Eclipse OpenJ9 und SAML. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien auszuweiten, Daten zu manipulieren, nicht spezifizierte Auswirkungen zu verursachen und einen Cross-Site-Scripting-Angriff durchzuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Berechtigungen." } ], "release_date": "2023-06-28T22:00:00Z", "title": "CVE-2018-3075" }, { "cve": "CVE-2018-3074", "notes": [ { "category": "description", "text": "In IBM Tivoli Network Manager existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in den Komponenten OpenSSL, Apache CXF, Apache HTTPD, Oracle MySQL, Apache Commons, Apache Struts, IBM GSKit, Java SDK, Eclipse OpenJ9 und SAML. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien auszuweiten, Daten zu manipulieren, nicht spezifizierte Auswirkungen zu verursachen und einen Cross-Site-Scripting-Angriff durchzuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Berechtigungen." } ], "release_date": "2023-06-28T22:00:00Z", "title": "CVE-2018-3074" }, { "cve": "CVE-2018-3073", "notes": [ { "category": "description", "text": "In IBM Tivoli Network Manager existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in den Komponenten OpenSSL, Apache CXF, Apache HTTPD, Oracle MySQL, Apache Commons, Apache Struts, IBM GSKit, Java SDK, Eclipse OpenJ9 und SAML. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien auszuweiten, Daten zu manipulieren, nicht spezifizierte Auswirkungen zu verursachen und einen Cross-Site-Scripting-Angriff durchzuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Berechtigungen." } ], "release_date": "2023-06-28T22:00:00Z", "title": "CVE-2018-3073" }, { "cve": "CVE-2018-3071", "notes": [ { "category": "description", "text": "In IBM Tivoli Network Manager existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in den Komponenten OpenSSL, Apache CXF, Apache HTTPD, Oracle MySQL, Apache Commons, Apache Struts, IBM GSKit, Java SDK, Eclipse OpenJ9 und SAML. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien auszuweiten, Daten zu manipulieren, nicht spezifizierte Auswirkungen zu verursachen und einen Cross-Site-Scripting-Angriff durchzuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Berechtigungen." } ], "release_date": "2023-06-28T22:00:00Z", "title": "CVE-2018-3071" }, { "cve": "CVE-2018-3070", "notes": [ { "category": "description", "text": "In IBM Tivoli Network Manager existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in den Komponenten OpenSSL, Apache CXF, Apache HTTPD, Oracle MySQL, Apache Commons, Apache Struts, IBM GSKit, Java SDK, Eclipse OpenJ9 und SAML. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien auszuweiten, Daten zu manipulieren, nicht spezifizierte Auswirkungen zu verursachen und einen Cross-Site-Scripting-Angriff durchzuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Berechtigungen." } ], "release_date": "2023-06-28T22:00:00Z", "title": "CVE-2018-3070" }, { "cve": "CVE-2018-3067", "notes": [ { "category": "description", "text": "In IBM Tivoli Network Manager existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in den Komponenten OpenSSL, Apache CXF, Apache HTTPD, Oracle MySQL, Apache Commons, Apache Struts, IBM GSKit, Java SDK, Eclipse OpenJ9 und SAML. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien auszuweiten, Daten zu manipulieren, nicht spezifizierte Auswirkungen zu verursachen und einen Cross-Site-Scripting-Angriff durchzuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Berechtigungen." } ], "release_date": "2023-06-28T22:00:00Z", "title": "CVE-2018-3067" }, { "cve": "CVE-2018-3066", "notes": [ { "category": "description", "text": "In IBM Tivoli Network Manager existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in den Komponenten OpenSSL, Apache CXF, Apache HTTPD, Oracle MySQL, Apache Commons, Apache Struts, IBM GSKit, Java SDK, Eclipse OpenJ9 und SAML. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien auszuweiten, Daten zu manipulieren, nicht spezifizierte Auswirkungen zu verursachen und einen Cross-Site-Scripting-Angriff durchzuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Berechtigungen." } ], "release_date": "2023-06-28T22:00:00Z", "title": "CVE-2018-3066" }, { "cve": "CVE-2018-3065", "notes": [ { "category": "description", "text": "In IBM Tivoli Network Manager existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in den Komponenten OpenSSL, Apache CXF, Apache HTTPD, Oracle MySQL, Apache Commons, Apache Struts, IBM GSKit, Java SDK, Eclipse OpenJ9 und SAML. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien auszuweiten, Daten zu manipulieren, nicht spezifizierte Auswirkungen zu verursachen und einen Cross-Site-Scripting-Angriff durchzuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Berechtigungen." } ], "release_date": "2023-06-28T22:00:00Z", "title": "CVE-2018-3065" }, { "cve": "CVE-2018-3064", "notes": [ { "category": "description", "text": "In IBM Tivoli Network Manager existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in den Komponenten OpenSSL, Apache CXF, Apache HTTPD, Oracle MySQL, Apache Commons, Apache Struts, IBM GSKit, Java SDK, Eclipse OpenJ9 und SAML. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien auszuweiten, Daten zu manipulieren, nicht spezifizierte Auswirkungen zu verursachen und einen Cross-Site-Scripting-Angriff durchzuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Berechtigungen." } ], "release_date": "2023-06-28T22:00:00Z", "title": "CVE-2018-3064" }, { "cve": "CVE-2018-3063", "notes": [ { "category": "description", "text": "In IBM Tivoli Network Manager existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in den Komponenten OpenSSL, Apache CXF, Apache HTTPD, Oracle MySQL, Apache Commons, Apache Struts, IBM GSKit, Java SDK, Eclipse OpenJ9 und SAML. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien auszuweiten, Daten zu manipulieren, nicht spezifizierte Auswirkungen zu verursachen und einen Cross-Site-Scripting-Angriff durchzuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Berechtigungen." } ], "release_date": "2023-06-28T22:00:00Z", "title": "CVE-2018-3063" }, { "cve": "CVE-2018-3062", "notes": [ { "category": "description", "text": "In IBM Tivoli Network Manager existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in den Komponenten OpenSSL, Apache CXF, Apache HTTPD, Oracle MySQL, Apache Commons, Apache Struts, IBM GSKit, Java SDK, Eclipse OpenJ9 und SAML. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien auszuweiten, Daten zu manipulieren, nicht spezifizierte Auswirkungen zu verursachen und einen Cross-Site-Scripting-Angriff durchzuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Berechtigungen." } ], "release_date": "2023-06-28T22:00:00Z", "title": "CVE-2018-3062" }, { "cve": "CVE-2018-3061", "notes": [ { "category": "description", "text": "In IBM Tivoli Network Manager existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in den Komponenten OpenSSL, Apache CXF, Apache HTTPD, Oracle MySQL, Apache Commons, Apache Struts, IBM GSKit, Java SDK, Eclipse OpenJ9 und SAML. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien auszuweiten, Daten zu manipulieren, nicht spezifizierte Auswirkungen zu verursachen und einen Cross-Site-Scripting-Angriff durchzuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Berechtigungen." } ], "release_date": "2023-06-28T22:00:00Z", "title": "CVE-2018-3061" }, { "cve": "CVE-2018-3060", "notes": [ { "category": "description", "text": "In IBM Tivoli Network Manager existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in den Komponenten OpenSSL, Apache CXF, Apache HTTPD, Oracle MySQL, Apache Commons, Apache Struts, IBM GSKit, Java SDK, Eclipse OpenJ9 und SAML. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien auszuweiten, Daten zu manipulieren, nicht spezifizierte Auswirkungen zu verursachen und einen Cross-Site-Scripting-Angriff durchzuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Berechtigungen." } ], "release_date": "2023-06-28T22:00:00Z", "title": "CVE-2018-3060" }, { "cve": "CVE-2018-3058", "notes": [ { "category": "description", "text": "In IBM Tivoli Network Manager existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in den Komponenten OpenSSL, Apache CXF, Apache HTTPD, Oracle MySQL, Apache Commons, Apache Struts, IBM GSKit, Java SDK, Eclipse OpenJ9 und SAML. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien auszuweiten, Daten zu manipulieren, nicht spezifizierte Auswirkungen zu verursachen und einen Cross-Site-Scripting-Angriff durchzuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Berechtigungen." } ], "release_date": "2023-06-28T22:00:00Z", "title": "CVE-2018-3058" }, { "cve": "CVE-2018-3056", "notes": [ { "category": "description", "text": "In IBM Tivoli Network Manager existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in den Komponenten OpenSSL, Apache CXF, Apache HTTPD, Oracle MySQL, Apache Commons, Apache Struts, IBM GSKit, Java SDK, Eclipse OpenJ9 und SAML. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien auszuweiten, Daten zu manipulieren, nicht spezifizierte Auswirkungen zu verursachen und einen Cross-Site-Scripting-Angriff durchzuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Berechtigungen." } ], "release_date": "2023-06-28T22:00:00Z", "title": "CVE-2018-3056" }, { "cve": "CVE-2018-3054", "notes": [ { "category": "description", "text": "In IBM Tivoli Network Manager existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in den Komponenten OpenSSL, Apache CXF, Apache HTTPD, Oracle MySQL, Apache Commons, Apache Struts, IBM GSKit, Java SDK, Eclipse OpenJ9 und SAML. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien auszuweiten, Daten zu manipulieren, nicht spezifizierte Auswirkungen zu verursachen und einen Cross-Site-Scripting-Angriff durchzuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Berechtigungen." } ], "release_date": "2023-06-28T22:00:00Z", "title": "CVE-2018-3054" }, { "cve": "CVE-2018-2877", "notes": [ { "category": "description", "text": "In IBM Tivoli Network Manager existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in den Komponenten OpenSSL, Apache CXF, Apache HTTPD, Oracle MySQL, Apache Commons, Apache Struts, IBM GSKit, Java SDK, Eclipse OpenJ9 und SAML. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien auszuweiten, Daten zu manipulieren, nicht spezifizierte Auswirkungen zu verursachen und einen Cross-Site-Scripting-Angriff durchzuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Berechtigungen." } ], "release_date": "2023-06-28T22:00:00Z", "title": "CVE-2018-2877" }, { "cve": "CVE-2018-2846", "notes": [ { "category": "description", "text": "In IBM Tivoli Network Manager existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in den Komponenten OpenSSL, Apache CXF, Apache HTTPD, Oracle MySQL, Apache Commons, Apache Struts, IBM GSKit, Java SDK, Eclipse OpenJ9 und SAML. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien auszuweiten, Daten zu manipulieren, nicht spezifizierte Auswirkungen zu verursachen und einen Cross-Site-Scripting-Angriff durchzuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Berechtigungen." } ], "release_date": "2023-06-28T22:00:00Z", "title": "CVE-2018-2846" }, { "cve": "CVE-2018-2839", "notes": [ { "category": "description", "text": "In IBM Tivoli Network Manager existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in den Komponenten OpenSSL, Apache CXF, Apache HTTPD, Oracle MySQL, Apache Commons, Apache Struts, IBM GSKit, Java SDK, Eclipse OpenJ9 und SAML. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien auszuweiten, Daten zu manipulieren, nicht spezifizierte Auswirkungen zu verursachen und einen Cross-Site-Scripting-Angriff durchzuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Berechtigungen." } ], "release_date": "2023-06-28T22:00:00Z", "title": "CVE-2018-2839" }, { "cve": "CVE-2018-2819", "notes": [ { "category": "description", "text": "In IBM Tivoli Network Manager existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in den Komponenten OpenSSL, Apache CXF, Apache HTTPD, Oracle MySQL, Apache Commons, Apache Struts, IBM GSKit, Java SDK, Eclipse OpenJ9 und SAML. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien auszuweiten, Daten zu manipulieren, nicht spezifizierte Auswirkungen zu verursachen und einen Cross-Site-Scripting-Angriff durchzuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Berechtigungen." } ], "release_date": "2023-06-28T22:00:00Z", "title": "CVE-2018-2819" }, { "cve": "CVE-2018-2818", "notes": [ { "category": "description", "text": "In IBM Tivoli Network Manager existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in den Komponenten OpenSSL, Apache CXF, Apache HTTPD, Oracle MySQL, Apache Commons, Apache Struts, IBM GSKit, Java SDK, Eclipse OpenJ9 und SAML. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien auszuweiten, Daten zu manipulieren, nicht spezifizierte Auswirkungen zu verursachen und einen Cross-Site-Scripting-Angriff durchzuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Berechtigungen." } ], "release_date": "2023-06-28T22:00:00Z", "title": "CVE-2018-2818" }, { "cve": "CVE-2018-2817", "notes": [ { "category": "description", "text": "In IBM Tivoli Network Manager existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in den Komponenten OpenSSL, Apache CXF, Apache HTTPD, Oracle MySQL, Apache Commons, Apache Struts, IBM GSKit, Java SDK, Eclipse OpenJ9 und SAML. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien auszuweiten, Daten zu manipulieren, nicht spezifizierte Auswirkungen zu verursachen und einen Cross-Site-Scripting-Angriff durchzuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Berechtigungen." } ], "release_date": "2023-06-28T22:00:00Z", "title": "CVE-2018-2817" }, { "cve": "CVE-2018-2816", "notes": [ { "category": "description", "text": "In IBM Tivoli Network Manager existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in den Komponenten OpenSSL, Apache CXF, Apache HTTPD, Oracle MySQL, Apache Commons, Apache Struts, IBM GSKit, Java SDK, Eclipse OpenJ9 und SAML. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien auszuweiten, Daten zu manipulieren, nicht spezifizierte Auswirkungen zu verursachen und einen Cross-Site-Scripting-Angriff durchzuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Berechtigungen." } ], "release_date": "2023-06-28T22:00:00Z", "title": "CVE-2018-2816" }, { "cve": "CVE-2018-2813", "notes": [ { "category": "description", "text": "In IBM Tivoli Network Manager existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in den Komponenten OpenSSL, Apache CXF, Apache HTTPD, Oracle MySQL, Apache Commons, Apache Struts, IBM GSKit, Java SDK, Eclipse OpenJ9 und SAML. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien auszuweiten, Daten zu manipulieren, nicht spezifizierte Auswirkungen zu verursachen und einen Cross-Site-Scripting-Angriff durchzuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Berechtigungen." } ], "release_date": "2023-06-28T22:00:00Z", "title": "CVE-2018-2813" }, { "cve": "CVE-2018-2812", "notes": [ { "category": "description", "text": "In IBM Tivoli Network Manager existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in den Komponenten OpenSSL, Apache CXF, Apache HTTPD, Oracle MySQL, Apache Commons, Apache Struts, IBM GSKit, Java SDK, Eclipse OpenJ9 und SAML. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien auszuweiten, Daten zu manipulieren, nicht spezifizierte Auswirkungen zu verursachen und einen Cross-Site-Scripting-Angriff durchzuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Berechtigungen." } ], "release_date": "2023-06-28T22:00:00Z", "title": "CVE-2018-2812" }, { "cve": "CVE-2018-2810", "notes": [ { "category": "description", "text": "In IBM Tivoli Network Manager existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in den Komponenten OpenSSL, Apache CXF, Apache HTTPD, Oracle MySQL, Apache Commons, Apache Struts, IBM GSKit, Java SDK, Eclipse OpenJ9 und SAML. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien auszuweiten, Daten zu manipulieren, nicht spezifizierte Auswirkungen zu verursachen und einen Cross-Site-Scripting-Angriff durchzuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Berechtigungen." } ], "release_date": "2023-06-28T22:00:00Z", "title": "CVE-2018-2810" }, { "cve": "CVE-2018-2805", "notes": [ { "category": "description", "text": "In IBM Tivoli Network Manager existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in den Komponenten OpenSSL, Apache CXF, Apache HTTPD, Oracle MySQL, Apache Commons, Apache Struts, IBM GSKit, Java SDK, Eclipse OpenJ9 und SAML. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien auszuweiten, Daten zu manipulieren, nicht spezifizierte Auswirkungen zu verursachen und einen Cross-Site-Scripting-Angriff durchzuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Berechtigungen." } ], "release_date": "2023-06-28T22:00:00Z", "title": "CVE-2018-2805" }, { "cve": "CVE-2018-2787", "notes": [ { "category": "description", "text": "In IBM Tivoli Network Manager existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in den Komponenten OpenSSL, Apache CXF, Apache HTTPD, Oracle MySQL, Apache Commons, Apache Struts, IBM GSKit, Java SDK, Eclipse OpenJ9 und SAML. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien auszuweiten, Daten zu manipulieren, nicht spezifizierte Auswirkungen zu verursachen und einen Cross-Site-Scripting-Angriff durchzuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Berechtigungen." } ], "release_date": "2023-06-28T22:00:00Z", "title": "CVE-2018-2787" }, { "cve": "CVE-2018-2786", "notes": [ { "category": "description", "text": "In IBM Tivoli Network Manager existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in den Komponenten OpenSSL, Apache CXF, Apache HTTPD, Oracle MySQL, Apache Commons, Apache Struts, IBM GSKit, Java SDK, Eclipse OpenJ9 und SAML. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien auszuweiten, Daten zu manipulieren, nicht spezifizierte Auswirkungen zu verursachen und einen Cross-Site-Scripting-Angriff durchzuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Berechtigungen." } ], "release_date": "2023-06-28T22:00:00Z", "title": "CVE-2018-2786" }, { "cve": "CVE-2018-2784", "notes": [ { "category": "description", "text": "In IBM Tivoli Network Manager existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in den Komponenten OpenSSL, Apache CXF, Apache HTTPD, Oracle MySQL, Apache Commons, Apache Struts, IBM GSKit, Java SDK, Eclipse OpenJ9 und SAML. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien auszuweiten, Daten zu manipulieren, nicht spezifizierte Auswirkungen zu verursachen und einen Cross-Site-Scripting-Angriff durchzuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Berechtigungen." } ], "release_date": "2023-06-28T22:00:00Z", "title": "CVE-2018-2784" }, { "cve": "CVE-2018-2782", "notes": [ { "category": "description", "text": "In IBM Tivoli Network Manager existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in den Komponenten OpenSSL, Apache CXF, Apache HTTPD, Oracle MySQL, Apache Commons, Apache Struts, IBM GSKit, Java SDK, Eclipse OpenJ9 und SAML. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien auszuweiten, Daten zu manipulieren, nicht spezifizierte Auswirkungen zu verursachen und einen Cross-Site-Scripting-Angriff durchzuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Berechtigungen." } ], "release_date": "2023-06-28T22:00:00Z", "title": "CVE-2018-2782" }, { "cve": "CVE-2018-2781", "notes": [ { "category": "description", "text": "In IBM Tivoli Network Manager existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in den Komponenten OpenSSL, Apache CXF, Apache HTTPD, Oracle MySQL, Apache Commons, Apache Struts, IBM GSKit, Java SDK, Eclipse OpenJ9 und SAML. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien auszuweiten, Daten zu manipulieren, nicht spezifizierte Auswirkungen zu verursachen und einen Cross-Site-Scripting-Angriff durchzuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Berechtigungen." } ], "release_date": "2023-06-28T22:00:00Z", "title": "CVE-2018-2781" }, { "cve": "CVE-2018-2780", "notes": [ { "category": "description", "text": "In IBM Tivoli Network Manager existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in den Komponenten OpenSSL, Apache CXF, Apache HTTPD, Oracle MySQL, Apache Commons, Apache Struts, IBM GSKit, Java SDK, Eclipse OpenJ9 und SAML. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien auszuweiten, Daten zu manipulieren, nicht spezifizierte Auswirkungen zu verursachen und einen Cross-Site-Scripting-Angriff durchzuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Berechtigungen." } ], "release_date": "2023-06-28T22:00:00Z", "title": "CVE-2018-2780" }, { "cve": "CVE-2018-2779", "notes": [ { "category": "description", "text": "In IBM Tivoli Network Manager existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in den Komponenten OpenSSL, Apache CXF, Apache HTTPD, Oracle MySQL, Apache Commons, Apache Struts, IBM GSKit, Java SDK, Eclipse OpenJ9 und SAML. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien auszuweiten, Daten zu manipulieren, nicht spezifizierte Auswirkungen zu verursachen und einen Cross-Site-Scripting-Angriff durchzuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Berechtigungen." } ], "release_date": "2023-06-28T22:00:00Z", "title": "CVE-2018-2779" }, { "cve": "CVE-2018-2778", "notes": [ { "category": "description", "text": "In IBM Tivoli Network Manager existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in den Komponenten OpenSSL, Apache CXF, Apache HTTPD, Oracle MySQL, Apache Commons, Apache Struts, IBM GSKit, Java SDK, Eclipse OpenJ9 und SAML. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien auszuweiten, Daten zu manipulieren, nicht spezifizierte Auswirkungen zu verursachen und einen Cross-Site-Scripting-Angriff durchzuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Berechtigungen." } ], "release_date": "2023-06-28T22:00:00Z", "title": "CVE-2018-2778" }, { "cve": "CVE-2018-2777", "notes": [ { "category": "description", "text": "In IBM Tivoli Network Manager existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in den Komponenten OpenSSL, Apache CXF, Apache HTTPD, Oracle MySQL, Apache Commons, Apache Struts, IBM GSKit, Java SDK, Eclipse OpenJ9 und SAML. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien auszuweiten, Daten zu manipulieren, nicht spezifizierte Auswirkungen zu verursachen und einen Cross-Site-Scripting-Angriff durchzuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Berechtigungen." } ], "release_date": "2023-06-28T22:00:00Z", "title": "CVE-2018-2777" }, { "cve": "CVE-2018-2776", "notes": [ { "category": "description", "text": "In IBM Tivoli Network Manager existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in den Komponenten OpenSSL, Apache CXF, Apache HTTPD, Oracle MySQL, Apache Commons, Apache Struts, IBM GSKit, Java SDK, Eclipse OpenJ9 und SAML. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien auszuweiten, Daten zu manipulieren, nicht spezifizierte Auswirkungen zu verursachen und einen Cross-Site-Scripting-Angriff durchzuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Berechtigungen." } ], "release_date": "2023-06-28T22:00:00Z", "title": "CVE-2018-2776" }, { "cve": "CVE-2018-2775", "notes": [ { "category": "description", "text": "In IBM Tivoli Network Manager existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in den Komponenten OpenSSL, Apache CXF, Apache HTTPD, Oracle MySQL, Apache Commons, Apache Struts, IBM GSKit, Java SDK, Eclipse OpenJ9 und SAML. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien auszuweiten, Daten zu manipulieren, nicht spezifizierte Auswirkungen zu verursachen und einen Cross-Site-Scripting-Angriff durchzuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Berechtigungen." } ], "release_date": "2023-06-28T22:00:00Z", "title": "CVE-2018-2775" }, { "cve": "CVE-2018-2773", "notes": [ { "category": "description", "text": "In IBM Tivoli Network Manager existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in den Komponenten OpenSSL, Apache CXF, Apache HTTPD, Oracle MySQL, Apache Commons, Apache Struts, IBM GSKit, Java SDK, Eclipse OpenJ9 und SAML. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien auszuweiten, Daten zu manipulieren, nicht spezifizierte Auswirkungen zu verursachen und einen Cross-Site-Scripting-Angriff durchzuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Berechtigungen." } ], "release_date": "2023-06-28T22:00:00Z", "title": "CVE-2018-2773" }, { "cve": "CVE-2018-2771", "notes": [ { "category": "description", "text": "In IBM Tivoli Network Manager existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in den Komponenten OpenSSL, Apache CXF, Apache HTTPD, Oracle MySQL, Apache Commons, Apache Struts, IBM GSKit, Java SDK, Eclipse OpenJ9 und SAML. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien auszuweiten, Daten zu manipulieren, nicht spezifizierte Auswirkungen zu verursachen und einen Cross-Site-Scripting-Angriff durchzuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Berechtigungen." } ], "release_date": "2023-06-28T22:00:00Z", "title": "CVE-2018-2771" }, { "cve": "CVE-2018-2769", "notes": [ { "category": "description", "text": "In IBM Tivoli Network Manager existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in den Komponenten OpenSSL, Apache CXF, Apache HTTPD, Oracle MySQL, Apache Commons, Apache Struts, IBM GSKit, Java SDK, Eclipse OpenJ9 und SAML. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien auszuweiten, Daten zu manipulieren, nicht spezifizierte Auswirkungen zu verursachen und einen Cross-Site-Scripting-Angriff durchzuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Berechtigungen." } ], "release_date": "2023-06-28T22:00:00Z", "title": "CVE-2018-2769" }, { "cve": "CVE-2018-2766", "notes": [ { "category": "description", "text": "In IBM Tivoli Network Manager existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in den Komponenten OpenSSL, Apache CXF, Apache HTTPD, Oracle MySQL, Apache Commons, Apache Struts, IBM GSKit, Java SDK, Eclipse OpenJ9 und SAML. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien auszuweiten, Daten zu manipulieren, nicht spezifizierte Auswirkungen zu verursachen und einen Cross-Site-Scripting-Angriff durchzuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Berechtigungen." } ], "release_date": "2023-06-28T22:00:00Z", "title": "CVE-2018-2766" }, { "cve": "CVE-2018-2762", "notes": [ { "category": "description", "text": "In IBM Tivoli Network Manager existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in den Komponenten OpenSSL, Apache CXF, Apache HTTPD, Oracle MySQL, Apache Commons, Apache Struts, IBM GSKit, Java SDK, Eclipse OpenJ9 und SAML. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien auszuweiten, Daten zu manipulieren, nicht spezifizierte Auswirkungen zu verursachen und einen Cross-Site-Scripting-Angriff durchzuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Berechtigungen." } ], "release_date": "2023-06-28T22:00:00Z", "title": "CVE-2018-2762" }, { "cve": "CVE-2018-2761", "notes": [ { "category": "description", "text": "In IBM Tivoli Network Manager existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in den Komponenten OpenSSL, Apache CXF, Apache HTTPD, Oracle MySQL, Apache Commons, Apache Struts, IBM GSKit, Java SDK, Eclipse OpenJ9 und SAML. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien auszuweiten, Daten zu manipulieren, nicht spezifizierte Auswirkungen zu verursachen und einen Cross-Site-Scripting-Angriff durchzuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Berechtigungen." } ], "release_date": "2023-06-28T22:00:00Z", "title": "CVE-2018-2761" }, { "cve": "CVE-2018-2759", "notes": [ { "category": "description", "text": "In IBM Tivoli Network Manager existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in den Komponenten OpenSSL, Apache CXF, Apache HTTPD, Oracle MySQL, Apache Commons, Apache Struts, IBM GSKit, Java SDK, Eclipse OpenJ9 und SAML. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien auszuweiten, Daten zu manipulieren, nicht spezifizierte Auswirkungen zu verursachen und einen Cross-Site-Scripting-Angriff durchzuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Berechtigungen." } ], "release_date": "2023-06-28T22:00:00Z", "title": "CVE-2018-2759" }, { "cve": "CVE-2018-2758", "notes": [ { "category": "description", "text": "In IBM Tivoli Network Manager existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in den Komponenten OpenSSL, Apache CXF, Apache HTTPD, Oracle MySQL, Apache Commons, Apache Struts, IBM GSKit, Java SDK, Eclipse OpenJ9 und SAML. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien auszuweiten, Daten zu manipulieren, nicht spezifizierte Auswirkungen zu verursachen und einen Cross-Site-Scripting-Angriff durchzuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Berechtigungen." } ], "release_date": "2023-06-28T22:00:00Z", "title": "CVE-2018-2758" }, { "cve": "CVE-2018-2755", "notes": [ { "category": "description", "text": "In IBM Tivoli Network Manager existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in den Komponenten OpenSSL, Apache CXF, Apache HTTPD, Oracle MySQL, Apache Commons, Apache Struts, IBM GSKit, Java SDK, Eclipse OpenJ9 und SAML. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien auszuweiten, Daten zu manipulieren, nicht spezifizierte Auswirkungen zu verursachen und einen Cross-Site-Scripting-Angriff durchzuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Berechtigungen." } ], "release_date": "2023-06-28T22:00:00Z", "title": "CVE-2018-2755" }, { "cve": "CVE-2018-2598", "notes": [ { "category": "description", "text": "In IBM Tivoli Network Manager existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in den Komponenten OpenSSL, Apache CXF, Apache HTTPD, Oracle MySQL, Apache Commons, Apache Struts, IBM GSKit, Java SDK, Eclipse OpenJ9 und SAML. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien auszuweiten, Daten zu manipulieren, nicht spezifizierte Auswirkungen zu verursachen und einen Cross-Site-Scripting-Angriff durchzuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Berechtigungen." } ], "release_date": "2023-06-28T22:00:00Z", "title": "CVE-2018-2598" }, { "cve": "CVE-2018-1996", "notes": [ { "category": "description", "text": "In IBM Tivoli Network Manager existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in den Komponenten OpenSSL, Apache CXF, Apache HTTPD, Oracle MySQL, Apache Commons, Apache Struts, IBM GSKit, Java SDK, Eclipse OpenJ9 und SAML. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien auszuweiten, Daten zu manipulieren, nicht spezifizierte Auswirkungen zu verursachen und einen Cross-Site-Scripting-Angriff durchzuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Berechtigungen." } ], "release_date": "2023-06-28T22:00:00Z", "title": "CVE-2018-1996" }, { "cve": "CVE-2018-1926", "notes": [ { "category": "description", "text": "In IBM Tivoli Network Manager existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in den Komponenten OpenSSL, Apache CXF, Apache HTTPD, Oracle MySQL, Apache Commons, Apache Struts, IBM GSKit, Java SDK, Eclipse OpenJ9 und SAML. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien auszuweiten, Daten zu manipulieren, nicht spezifizierte Auswirkungen zu verursachen und einen Cross-Site-Scripting-Angriff durchzuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Berechtigungen." } ], "release_date": "2023-06-28T22:00:00Z", "title": "CVE-2018-1926" }, { "cve": "CVE-2018-1904", "notes": [ { "category": "description", "text": "In IBM Tivoli Network Manager existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in den Komponenten OpenSSL, Apache CXF, Apache HTTPD, Oracle MySQL, Apache Commons, Apache Struts, IBM GSKit, Java SDK, Eclipse OpenJ9 und SAML. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien auszuweiten, Daten zu manipulieren, nicht spezifizierte Auswirkungen zu verursachen und einen Cross-Site-Scripting-Angriff durchzuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Berechtigungen." } ], "release_date": "2023-06-28T22:00:00Z", "title": "CVE-2018-1904" }, { "cve": "CVE-2018-1902", "notes": [ { "category": "description", "text": "In IBM Tivoli Network Manager existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in den Komponenten OpenSSL, Apache CXF, Apache HTTPD, Oracle MySQL, Apache Commons, Apache Struts, IBM GSKit, Java SDK, Eclipse OpenJ9 und SAML. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien auszuweiten, Daten zu manipulieren, nicht spezifizierte Auswirkungen zu verursachen und einen Cross-Site-Scripting-Angriff durchzuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Berechtigungen." } ], "release_date": "2023-06-28T22:00:00Z", "title": "CVE-2018-1902" }, { "cve": "CVE-2018-1901", "notes": [ { "category": "description", "text": "In IBM Tivoli Network Manager existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in den Komponenten OpenSSL, Apache CXF, Apache HTTPD, Oracle MySQL, Apache Commons, Apache Struts, IBM GSKit, Java SDK, Eclipse OpenJ9 und SAML. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien auszuweiten, Daten zu manipulieren, nicht spezifizierte Auswirkungen zu verursachen und einen Cross-Site-Scripting-Angriff durchzuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Berechtigungen." } ], "release_date": "2023-06-28T22:00:00Z", "title": "CVE-2018-1901" }, { "cve": "CVE-2018-1798", "notes": [ { "category": "description", "text": "In IBM Tivoli Network Manager existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in den Komponenten OpenSSL, Apache CXF, Apache HTTPD, Oracle MySQL, Apache Commons, Apache Struts, IBM GSKit, Java SDK, Eclipse OpenJ9 und SAML. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien auszuweiten, Daten zu manipulieren, nicht spezifizierte Auswirkungen zu verursachen und einen Cross-Site-Scripting-Angriff durchzuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Berechtigungen." } ], "release_date": "2023-06-28T22:00:00Z", "title": "CVE-2018-1798" }, { "cve": "CVE-2018-1797", "notes": [ { "category": "description", "text": "In IBM Tivoli Network Manager existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in den Komponenten OpenSSL, Apache CXF, Apache HTTPD, Oracle MySQL, Apache Commons, Apache Struts, IBM GSKit, Java SDK, Eclipse OpenJ9 und SAML. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien auszuweiten, Daten zu manipulieren, nicht spezifizierte Auswirkungen zu verursachen und einen Cross-Site-Scripting-Angriff durchzuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Berechtigungen." } ], "release_date": "2023-06-28T22:00:00Z", "title": "CVE-2018-1797" }, { "cve": "CVE-2018-1794", "notes": [ { "category": "description", "text": "In IBM Tivoli Network Manager existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in den Komponenten OpenSSL, Apache CXF, Apache HTTPD, Oracle MySQL, Apache Commons, Apache Struts, IBM GSKit, Java SDK, Eclipse OpenJ9 und SAML. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien auszuweiten, Daten zu manipulieren, nicht spezifizierte Auswirkungen zu verursachen und einen Cross-Site-Scripting-Angriff durchzuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Berechtigungen." } ], "release_date": "2023-06-28T22:00:00Z", "title": "CVE-2018-1794" }, { "cve": "CVE-2018-1793", "notes": [ { "category": "description", "text": "In IBM Tivoli Network Manager existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in den Komponenten OpenSSL, Apache CXF, Apache HTTPD, Oracle MySQL, Apache Commons, Apache Struts, IBM GSKit, Java SDK, Eclipse OpenJ9 und SAML. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien auszuweiten, Daten zu manipulieren, nicht spezifizierte Auswirkungen zu verursachen und einen Cross-Site-Scripting-Angriff durchzuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Berechtigungen." } ], "release_date": "2023-06-28T22:00:00Z", "title": "CVE-2018-1793" }, { "cve": "CVE-2018-1777", "notes": [ { "category": "description", "text": "In IBM Tivoli Network Manager existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in den Komponenten OpenSSL, Apache CXF, Apache HTTPD, Oracle MySQL, Apache Commons, Apache Struts, IBM GSKit, Java SDK, Eclipse OpenJ9 und SAML. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien auszuweiten, Daten zu manipulieren, nicht spezifizierte Auswirkungen zu verursachen und einen Cross-Site-Scripting-Angriff durchzuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Berechtigungen." } ], "release_date": "2023-06-28T22:00:00Z", "title": "CVE-2018-1777" }, { "cve": "CVE-2018-1770", "notes": [ { "category": "description", "text": "In IBM Tivoli Network Manager existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in den Komponenten OpenSSL, Apache CXF, Apache HTTPD, Oracle MySQL, Apache Commons, Apache Struts, IBM GSKit, Java SDK, Eclipse OpenJ9 und SAML. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien auszuweiten, Daten zu manipulieren, nicht spezifizierte Auswirkungen zu verursachen und einen Cross-Site-Scripting-Angriff durchzuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Berechtigungen." } ], "release_date": "2023-06-28T22:00:00Z", "title": "CVE-2018-1770" }, { "cve": "CVE-2018-1767", "notes": [ { "category": "description", "text": "In IBM Tivoli Network Manager existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in den Komponenten OpenSSL, Apache CXF, Apache HTTPD, Oracle MySQL, Apache Commons, Apache Struts, IBM GSKit, Java SDK, Eclipse OpenJ9 und SAML. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien auszuweiten, Daten zu manipulieren, nicht spezifizierte Auswirkungen zu verursachen und einen Cross-Site-Scripting-Angriff durchzuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Berechtigungen." } ], "release_date": "2023-06-28T22:00:00Z", "title": "CVE-2018-1767" }, { "cve": "CVE-2018-1719", "notes": [ { "category": "description", "text": "In IBM Tivoli Network Manager existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in den Komponenten OpenSSL, Apache CXF, Apache HTTPD, Oracle MySQL, Apache Commons, Apache Struts, IBM GSKit, Java SDK, Eclipse OpenJ9 und SAML. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien auszuweiten, Daten zu manipulieren, nicht spezifizierte Auswirkungen zu verursachen und einen Cross-Site-Scripting-Angriff durchzuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Berechtigungen." } ], "release_date": "2023-06-28T22:00:00Z", "title": "CVE-2018-1719" }, { "cve": "CVE-2018-1695", "notes": [ { "category": "description", "text": "In IBM Tivoli Network Manager existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in den Komponenten OpenSSL, Apache CXF, Apache HTTPD, Oracle MySQL, Apache Commons, Apache Struts, IBM GSKit, Java SDK, Eclipse OpenJ9 und SAML. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien auszuweiten, Daten zu manipulieren, nicht spezifizierte Auswirkungen zu verursachen und einen Cross-Site-Scripting-Angriff durchzuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Berechtigungen." } ], "release_date": "2023-06-28T22:00:00Z", "title": "CVE-2018-1695" }, { "cve": "CVE-2018-1656", "notes": [ { "category": "description", "text": "In IBM Tivoli Network Manager existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in den Komponenten OpenSSL, Apache CXF, Apache HTTPD, Oracle MySQL, Apache Commons, Apache Struts, IBM GSKit, Java SDK, Eclipse OpenJ9 und SAML. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien auszuweiten, Daten zu manipulieren, nicht spezifizierte Auswirkungen zu verursachen und einen Cross-Site-Scripting-Angriff durchzuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Berechtigungen." } ], "release_date": "2023-06-28T22:00:00Z", "title": "CVE-2018-1656" }, { "cve": "CVE-2018-1643", "notes": [ { "category": "description", "text": "In IBM Tivoli Network Manager existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in den Komponenten OpenSSL, Apache CXF, Apache HTTPD, Oracle MySQL, Apache Commons, Apache Struts, IBM GSKit, Java SDK, Eclipse OpenJ9 und SAML. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien auszuweiten, Daten zu manipulieren, nicht spezifizierte Auswirkungen zu verursachen und einen Cross-Site-Scripting-Angriff durchzuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Berechtigungen." } ], "release_date": "2023-06-28T22:00:00Z", "title": "CVE-2018-1643" }, { "cve": "CVE-2018-1621", "notes": [ { "category": "description", "text": "In IBM Tivoli Network Manager existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in den Komponenten OpenSSL, Apache CXF, Apache HTTPD, Oracle MySQL, Apache Commons, Apache Struts, IBM GSKit, Java SDK, Eclipse OpenJ9 und SAML. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien auszuweiten, Daten zu manipulieren, nicht spezifizierte Auswirkungen zu verursachen und einen Cross-Site-Scripting-Angriff durchzuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Berechtigungen." } ], "release_date": "2023-06-28T22:00:00Z", "title": "CVE-2018-1621" }, { "cve": "CVE-2018-1614", "notes": [ { "category": "description", "text": "In IBM Tivoli Network Manager existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in den Komponenten OpenSSL, Apache CXF, Apache HTTPD, Oracle MySQL, Apache Commons, Apache Struts, IBM GSKit, Java SDK, Eclipse OpenJ9 und SAML. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien auszuweiten, Daten zu manipulieren, nicht spezifizierte Auswirkungen zu verursachen und einen Cross-Site-Scripting-Angriff durchzuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Berechtigungen." } ], "release_date": "2023-06-28T22:00:00Z", "title": "CVE-2018-1614" }, { "cve": "CVE-2018-1567", "notes": [ { "category": "description", "text": "In IBM Tivoli Network Manager existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in den Komponenten OpenSSL, Apache CXF, Apache HTTPD, Oracle MySQL, Apache Commons, Apache Struts, IBM GSKit, Java SDK, Eclipse OpenJ9 und SAML. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien auszuweiten, Daten zu manipulieren, nicht spezifizierte Auswirkungen zu verursachen und einen Cross-Site-Scripting-Angriff durchzuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Berechtigungen." } ], "release_date": "2023-06-28T22:00:00Z", "title": "CVE-2018-1567" }, { "cve": "CVE-2018-1447", "notes": [ { "category": "description", "text": "In IBM Tivoli Network Manager existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in den Komponenten OpenSSL, Apache CXF, Apache HTTPD, Oracle MySQL, Apache Commons, Apache Struts, IBM GSKit, Java SDK, Eclipse OpenJ9 und SAML. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien auszuweiten, Daten zu manipulieren, nicht spezifizierte Auswirkungen zu verursachen und einen Cross-Site-Scripting-Angriff durchzuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Berechtigungen." } ], "release_date": "2023-06-28T22:00:00Z", "title": "CVE-2018-1447" }, { "cve": "CVE-2018-1428", "notes": [ { "category": "description", "text": "In IBM Tivoli Network Manager existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in den Komponenten OpenSSL, Apache CXF, Apache HTTPD, Oracle MySQL, Apache Commons, Apache Struts, IBM GSKit, Java SDK, Eclipse OpenJ9 und SAML. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien auszuweiten, Daten zu manipulieren, nicht spezifizierte Auswirkungen zu verursachen und einen Cross-Site-Scripting-Angriff durchzuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Berechtigungen." } ], "release_date": "2023-06-28T22:00:00Z", "title": "CVE-2018-1428" }, { "cve": "CVE-2018-1427", "notes": [ { "category": "description", "text": "In IBM Tivoli Network Manager existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in den Komponenten OpenSSL, Apache CXF, Apache HTTPD, Oracle MySQL, Apache Commons, Apache Struts, IBM GSKit, Java SDK, Eclipse OpenJ9 und SAML. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien auszuweiten, Daten zu manipulieren, nicht spezifizierte Auswirkungen zu verursachen und einen Cross-Site-Scripting-Angriff durchzuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Berechtigungen." } ], "release_date": "2023-06-28T22:00:00Z", "title": "CVE-2018-1427" }, { "cve": "CVE-2018-1426", "notes": [ { "category": "description", "text": "In IBM Tivoli Network Manager existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in den Komponenten OpenSSL, Apache CXF, Apache HTTPD, Oracle MySQL, Apache Commons, Apache Struts, IBM GSKit, Java SDK, Eclipse OpenJ9 und SAML. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien auszuweiten, Daten zu manipulieren, nicht spezifizierte Auswirkungen zu verursachen und einen Cross-Site-Scripting-Angriff durchzuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Berechtigungen." } ], "release_date": "2023-06-28T22:00:00Z", "title": "CVE-2018-1426" }, { "cve": "CVE-2018-1301", "notes": [ { "category": "description", "text": "In IBM Tivoli Network Manager existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in den Komponenten OpenSSL, Apache CXF, Apache HTTPD, Oracle MySQL, Apache Commons, Apache Struts, IBM GSKit, Java SDK, Eclipse OpenJ9 und SAML. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien auszuweiten, Daten zu manipulieren, nicht spezifizierte Auswirkungen zu verursachen und einen Cross-Site-Scripting-Angriff durchzuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Berechtigungen." } ], "release_date": "2023-06-28T22:00:00Z", "title": "CVE-2018-1301" }, { "cve": "CVE-2018-12539", "notes": [ { "category": "description", "text": "In IBM Tivoli Network Manager existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in den Komponenten OpenSSL, Apache CXF, Apache HTTPD, Oracle MySQL, Apache Commons, Apache Struts, IBM GSKit, Java SDK, Eclipse OpenJ9 und SAML. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien auszuweiten, Daten zu manipulieren, nicht spezifizierte Auswirkungen zu verursachen und einen Cross-Site-Scripting-Angriff durchzuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Berechtigungen." } ], "release_date": "2023-06-28T22:00:00Z", "title": "CVE-2018-12539" }, { "cve": "CVE-2018-10237", "notes": [ { "category": "description", "text": "In IBM Tivoli Network Manager existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in den Komponenten OpenSSL, Apache CXF, Apache HTTPD, Oracle MySQL, Apache Commons, Apache Struts, IBM GSKit, Java SDK, Eclipse OpenJ9 und SAML. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien auszuweiten, Daten zu manipulieren, nicht spezifizierte Auswirkungen zu verursachen und einen Cross-Site-Scripting-Angriff durchzuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Berechtigungen." } ], "release_date": "2023-06-28T22:00:00Z", "title": "CVE-2018-10237" }, { "cve": "CVE-2018-0734", "notes": [ { "category": "description", "text": "In IBM Tivoli Network Manager existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in den Komponenten OpenSSL, Apache CXF, Apache HTTPD, Oracle MySQL, Apache Commons, Apache Struts, IBM GSKit, Java SDK, Eclipse OpenJ9 und SAML. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien auszuweiten, Daten zu manipulieren, nicht spezifizierte Auswirkungen zu verursachen und einen Cross-Site-Scripting-Angriff durchzuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Berechtigungen." } ], "release_date": "2023-06-28T22:00:00Z", "title": "CVE-2018-0734" }, { "cve": "CVE-2018-0732", "notes": [ { "category": "description", "text": "In IBM Tivoli Network Manager existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in den Komponenten OpenSSL, Apache CXF, Apache HTTPD, Oracle MySQL, Apache Commons, Apache Struts, IBM GSKit, Java SDK, Eclipse OpenJ9 und SAML. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien auszuweiten, Daten zu manipulieren, nicht spezifizierte Auswirkungen zu verursachen und einen Cross-Site-Scripting-Angriff durchzuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Berechtigungen." } ], "release_date": "2023-06-28T22:00:00Z", "title": "CVE-2018-0732" }, { "cve": "CVE-2017-9798", "notes": [ { "category": "description", "text": "In IBM Tivoli Network Manager existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in den Komponenten OpenSSL, Apache CXF, Apache HTTPD, Oracle MySQL, Apache Commons, Apache Struts, IBM GSKit, Java SDK, Eclipse OpenJ9 und SAML. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien auszuweiten, Daten zu manipulieren, nicht spezifizierte Auswirkungen zu verursachen und einen Cross-Site-Scripting-Angriff durchzuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Berechtigungen." } ], "release_date": "2023-06-28T22:00:00Z", "title": "CVE-2017-9798" }, { "cve": "CVE-2017-3738", "notes": [ { "category": "description", "text": "In IBM Tivoli Network Manager existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in den Komponenten OpenSSL, Apache CXF, Apache HTTPD, Oracle MySQL, Apache Commons, Apache Struts, IBM GSKit, Java SDK, Eclipse OpenJ9 und SAML. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien auszuweiten, Daten zu manipulieren, nicht spezifizierte Auswirkungen zu verursachen und einen Cross-Site-Scripting-Angriff durchzuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Berechtigungen." } ], "release_date": "2023-06-28T22:00:00Z", "title": "CVE-2017-3738" }, { "cve": "CVE-2017-3737", "notes": [ { "category": "description", "text": "In IBM Tivoli Network Manager existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in den Komponenten OpenSSL, Apache CXF, Apache HTTPD, Oracle MySQL, Apache Commons, Apache Struts, IBM GSKit, Java SDK, Eclipse OpenJ9 und SAML. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien auszuweiten, Daten zu manipulieren, nicht spezifizierte Auswirkungen zu verursachen und einen Cross-Site-Scripting-Angriff durchzuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Berechtigungen." } ], "release_date": "2023-06-28T22:00:00Z", "title": "CVE-2017-3737" }, { "cve": "CVE-2017-3736", "notes": [ { "category": "description", "text": "In IBM Tivoli Network Manager existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in den Komponenten OpenSSL, Apache CXF, Apache HTTPD, Oracle MySQL, Apache Commons, Apache Struts, IBM GSKit, Java SDK, Eclipse OpenJ9 und SAML. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien auszuweiten, Daten zu manipulieren, nicht spezifizierte Auswirkungen zu verursachen und einen Cross-Site-Scripting-Angriff durchzuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Berechtigungen." } ], "release_date": "2023-06-28T22:00:00Z", "title": "CVE-2017-3736" }, { "cve": "CVE-2017-3735", "notes": [ { "category": "description", "text": "In IBM Tivoli Network Manager existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in den Komponenten OpenSSL, Apache CXF, Apache HTTPD, Oracle MySQL, Apache Commons, Apache Struts, IBM GSKit, Java SDK, Eclipse OpenJ9 und SAML. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien auszuweiten, Daten zu manipulieren, nicht spezifizierte Auswirkungen zu verursachen und einen Cross-Site-Scripting-Angriff durchzuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Berechtigungen." } ], "release_date": "2023-06-28T22:00:00Z", "title": "CVE-2017-3735" }, { "cve": "CVE-2017-3732", "notes": [ { "category": "description", "text": "In IBM Tivoli Network Manager existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in den Komponenten OpenSSL, Apache CXF, Apache HTTPD, Oracle MySQL, Apache Commons, Apache Struts, IBM GSKit, Java SDK, Eclipse OpenJ9 und SAML. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien auszuweiten, Daten zu manipulieren, nicht spezifizierte Auswirkungen zu verursachen und einen Cross-Site-Scripting-Angriff durchzuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Berechtigungen." } ], "release_date": "2023-06-28T22:00:00Z", "title": "CVE-2017-3732" }, { "cve": "CVE-2017-1743", "notes": [ { "category": "description", "text": "In IBM Tivoli Network Manager existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in den Komponenten OpenSSL, Apache CXF, Apache HTTPD, Oracle MySQL, Apache Commons, Apache Struts, IBM GSKit, Java SDK, Eclipse OpenJ9 und SAML. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien auszuweiten, Daten zu manipulieren, nicht spezifizierte Auswirkungen zu verursachen und einen Cross-Site-Scripting-Angriff durchzuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Berechtigungen." } ], "release_date": "2023-06-28T22:00:00Z", "title": "CVE-2017-1743" }, { "cve": "CVE-2017-1741", "notes": [ { "category": "description", "text": "In IBM Tivoli Network Manager existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in den Komponenten OpenSSL, Apache CXF, Apache HTTPD, Oracle MySQL, Apache Commons, Apache Struts, IBM GSKit, Java SDK, Eclipse OpenJ9 und SAML. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien auszuweiten, Daten zu manipulieren, nicht spezifizierte Auswirkungen zu verursachen und einen Cross-Site-Scripting-Angriff durchzuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Berechtigungen." } ], "release_date": "2023-06-28T22:00:00Z", "title": "CVE-2017-1741" }, { "cve": "CVE-2017-1731", "notes": [ { "category": "description", "text": "In IBM Tivoli Network Manager existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in den Komponenten OpenSSL, Apache CXF, Apache HTTPD, Oracle MySQL, Apache Commons, Apache Struts, IBM GSKit, Java SDK, Eclipse OpenJ9 und SAML. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien auszuweiten, Daten zu manipulieren, nicht spezifizierte Auswirkungen zu verursachen und einen Cross-Site-Scripting-Angriff durchzuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Berechtigungen." } ], "release_date": "2023-06-28T22:00:00Z", "title": "CVE-2017-1731" }, { "cve": "CVE-2017-1681", "notes": [ { "category": "description", "text": "In IBM Tivoli Network Manager existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in den Komponenten OpenSSL, Apache CXF, Apache HTTPD, Oracle MySQL, Apache Commons, Apache Struts, IBM GSKit, Java SDK, Eclipse OpenJ9 und SAML. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien auszuweiten, Daten zu manipulieren, nicht spezifizierte Auswirkungen zu verursachen und einen Cross-Site-Scripting-Angriff durchzuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Berechtigungen." } ], "release_date": "2023-06-28T22:00:00Z", "title": "CVE-2017-1681" }, { "cve": "CVE-2017-15715", "notes": [ { "category": "description", "text": "In IBM Tivoli Network Manager existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in den Komponenten OpenSSL, Apache CXF, Apache HTTPD, Oracle MySQL, Apache Commons, Apache Struts, IBM GSKit, Java SDK, Eclipse OpenJ9 und SAML. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien auszuweiten, Daten zu manipulieren, nicht spezifizierte Auswirkungen zu verursachen und einen Cross-Site-Scripting-Angriff durchzuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Berechtigungen." } ], "release_date": "2023-06-28T22:00:00Z", "title": "CVE-2017-15715" }, { "cve": "CVE-2017-15710", "notes": [ { "category": "description", "text": "In IBM Tivoli Network Manager existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in den Komponenten OpenSSL, Apache CXF, Apache HTTPD, Oracle MySQL, Apache Commons, Apache Struts, IBM GSKit, Java SDK, Eclipse OpenJ9 und SAML. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien auszuweiten, Daten zu manipulieren, nicht spezifizierte Auswirkungen zu verursachen und einen Cross-Site-Scripting-Angriff durchzuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Berechtigungen." } ], "release_date": "2023-06-28T22:00:00Z", "title": "CVE-2017-15710" }, { "cve": "CVE-2017-12624", "notes": [ { "category": "description", "text": "In IBM Tivoli Network Manager existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in den Komponenten OpenSSL, Apache CXF, Apache HTTPD, Oracle MySQL, Apache Commons, Apache Struts, IBM GSKit, Java SDK, Eclipse OpenJ9 und SAML. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien auszuweiten, Daten zu manipulieren, nicht spezifizierte Auswirkungen zu verursachen und einen Cross-Site-Scripting-Angriff durchzuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Berechtigungen." } ], "release_date": "2023-06-28T22:00:00Z", "title": "CVE-2017-12624" }, { "cve": "CVE-2017-12618", "notes": [ { "category": "description", "text": "In IBM Tivoli Network Manager existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in den Komponenten OpenSSL, Apache CXF, Apache HTTPD, Oracle MySQL, Apache Commons, Apache Struts, IBM GSKit, Java SDK, Eclipse OpenJ9 und SAML. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien auszuweiten, Daten zu manipulieren, nicht spezifizierte Auswirkungen zu verursachen und einen Cross-Site-Scripting-Angriff durchzuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Berechtigungen." } ], "release_date": "2023-06-28T22:00:00Z", "title": "CVE-2017-12618" }, { "cve": "CVE-2017-12613", "notes": [ { "category": "description", "text": "In IBM Tivoli Network Manager existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in den Komponenten OpenSSL, Apache CXF, Apache HTTPD, Oracle MySQL, Apache Commons, Apache Struts, IBM GSKit, Java SDK, Eclipse OpenJ9 und SAML. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien auszuweiten, Daten zu manipulieren, nicht spezifizierte Auswirkungen zu verursachen und einen Cross-Site-Scripting-Angriff durchzuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Berechtigungen." } ], "release_date": "2023-06-28T22:00:00Z", "title": "CVE-2017-12613" }, { "cve": "CVE-2016-0705", "notes": [ { "category": "description", "text": "In IBM Tivoli Network Manager existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in den Komponenten OpenSSL, Apache CXF, Apache HTTPD, Oracle MySQL, Apache Commons, Apache Struts, IBM GSKit, Java SDK, Eclipse OpenJ9 und SAML. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien auszuweiten, Daten zu manipulieren, nicht spezifizierte Auswirkungen zu verursachen und einen Cross-Site-Scripting-Angriff durchzuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Berechtigungen." } ], "release_date": "2023-06-28T22:00:00Z", "title": "CVE-2016-0705" }, { "cve": "CVE-2016-0702", "notes": [ { "category": "description", "text": "In IBM Tivoli Network Manager existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in den Komponenten OpenSSL, Apache CXF, Apache HTTPD, Oracle MySQL, Apache Commons, Apache Struts, IBM GSKit, Java SDK, Eclipse OpenJ9 und SAML. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien auszuweiten, Daten zu manipulieren, nicht spezifizierte Auswirkungen zu verursachen und einen Cross-Site-Scripting-Angriff durchzuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Berechtigungen." } ], "release_date": "2023-06-28T22:00:00Z", "title": "CVE-2016-0702" }, { "cve": "CVE-2016-0701", "notes": [ { "category": "description", "text": "In IBM Tivoli Network Manager existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in den Komponenten OpenSSL, Apache CXF, Apache HTTPD, Oracle MySQL, Apache Commons, Apache Struts, IBM GSKit, Java SDK, Eclipse OpenJ9 und SAML. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien auszuweiten, Daten zu manipulieren, nicht spezifizierte Auswirkungen zu verursachen und einen Cross-Site-Scripting-Angriff durchzuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Berechtigungen." } ], "release_date": "2023-06-28T22:00:00Z", "title": "CVE-2016-0701" }, { "cve": "CVE-2015-0899", "notes": [ { "category": "description", "text": "In IBM Tivoli Network Manager existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in den Komponenten OpenSSL, Apache CXF, Apache HTTPD, Oracle MySQL, Apache Commons, Apache Struts, IBM GSKit, Java SDK, Eclipse OpenJ9 und SAML. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien auszuweiten, Daten zu manipulieren, nicht spezifizierte Auswirkungen zu verursachen und einen Cross-Site-Scripting-Angriff durchzuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Berechtigungen." } ], "release_date": "2023-06-28T22:00:00Z", "title": "CVE-2015-0899" }, { "cve": "CVE-2014-7810", "notes": [ { "category": "description", "text": "In IBM Tivoli Network Manager existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in den Komponenten OpenSSL, Apache CXF, Apache HTTPD, Oracle MySQL, Apache Commons, Apache Struts, IBM GSKit, Java SDK, Eclipse OpenJ9 und SAML. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien auszuweiten, Daten zu manipulieren, nicht spezifizierte Auswirkungen zu verursachen und einen Cross-Site-Scripting-Angriff durchzuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Berechtigungen." } ], "release_date": "2023-06-28T22:00:00Z", "title": "CVE-2014-7810" }, { "cve": "CVE-2012-5783", "notes": [ { "category": "description", "text": "In IBM Tivoli Network Manager existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in den Komponenten OpenSSL, Apache CXF, Apache HTTPD, Oracle MySQL, Apache Commons, Apache Struts, IBM GSKit, Java SDK, Eclipse OpenJ9 und SAML. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien auszuweiten, Daten zu manipulieren, nicht spezifizierte Auswirkungen zu verursachen und einen Cross-Site-Scripting-Angriff durchzuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Berechtigungen." } ], "release_date": "2023-06-28T22:00:00Z", "title": "CVE-2012-5783" } ] }
wid-sec-w-2023-1424
Vulnerability from csaf_certbund
Notes
{ "document": { "aggregate_severity": { "text": "hoch" }, "category": "csaf_base", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "de-DE", "notes": [ { "category": "legal_disclaimer", "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen." }, { "category": "description", "text": "FreeFlow-Druckserver ist eine Druckserveranwendung f\u00fcr Xerox-Produktionsdrucker, die Flexibilit\u00e4t, umfangreiche Workflow-Optionen und eine Farbverwaltung bietet.", "title": "Produktbeschreibung" }, { "category": "summary", "text": "Ein Angreifer kann mehrere Schwachstellen in Xerox FreeFlow Print Server ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden.", "title": "Angriff" }, { "category": "general", "text": "- UNIX", "title": "Betroffene Betriebssysteme" } ], "publisher": { "category": "other", "contact_details": "csaf-provider@cert-bund.de", "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik", "namespace": "https://www.bsi.bund.de" }, "references": [ { "category": "self", "summary": "WID-SEC-W-2023-1424 - CSAF Version", "url": "https://wid.cert-bund.de/.well-known/csaf/white/2023/wid-sec-w-2023-1424.json" }, { "category": "self", "summary": "WID-SEC-2023-1424 - Portal Version", "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2023-1424" }, { "category": "external", "summary": "Xerox Security Bulletin vom 2023-06-12", "url": "https://securitydocs.business.xerox.com/wp-content/uploads/2023/06/Xerox-Security-Bulletin-XRX23-009-Xerox%C2%AE-FreeFlow%C2%AE-Print-Server-v9.pdf" } ], "source_lang": "en-US", "title": "Xerox FreeFlow Print Server f\u00fcr Solaris: Mehrere Schwachstellen", "tracking": { "current_release_date": "2023-06-12T22:00:00.000+00:00", "generator": { "date": "2024-02-15T17:30:41.322+00:00", "engine": { "name": "BSI-WID", "version": "1.3.0" } }, "id": "WID-SEC-W-2023-1424", "initial_release_date": "2023-06-12T22:00:00.000+00:00", "revision_history": [ { "date": "2023-06-12T22:00:00.000+00:00", "number": "1", "summary": "Initiale Fassung" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "category": "product_name", "name": "Xerox FreeFlow Print Server v9 for Solaris", "product": { "name": "Xerox FreeFlow Print Server v9 for Solaris", "product_id": "T028053", "product_identification_helper": { "cpe": "cpe:/a:xerox:freeflow_print_server:v9_for_solaris" } } } ], "category": "vendor", "name": "Xerox" } ] }, "vulnerabilities": [ { "cve": "CVE-2023-28708", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2023-28708" }, { "cve": "CVE-2023-28176", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2023-28176" }, { "cve": "CVE-2023-28164", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2023-28164" }, { "cve": "CVE-2023-28163", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2023-28163" }, { "cve": "CVE-2023-28162", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2023-28162" }, { "cve": "CVE-2023-27522", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2023-27522" }, { "cve": "CVE-2023-25752", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2023-25752" }, { "cve": "CVE-2023-25751", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2023-25751" }, { "cve": "CVE-2023-25746", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2023-25746" }, { "cve": "CVE-2023-25744", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2023-25744" }, { "cve": "CVE-2023-25743", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2023-25743" }, { "cve": "CVE-2023-25742", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2023-25742" }, { "cve": "CVE-2023-25739", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2023-25739" }, { "cve": "CVE-2023-25738", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2023-25738" }, { "cve": "CVE-2023-25737", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2023-25737" }, { "cve": "CVE-2023-25735", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2023-25735" }, { "cve": "CVE-2023-25734", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2023-25734" }, { "cve": "CVE-2023-25732", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2023-25732" }, { "cve": "CVE-2023-25730", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2023-25730" }, { "cve": "CVE-2023-25729", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2023-25729" }, { "cve": "CVE-2023-25728", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2023-25728" }, { "cve": "CVE-2023-25690", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2023-25690" }, { "cve": "CVE-2023-24998", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2023-24998" }, { "cve": "CVE-2023-24807", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2023-24807" }, { "cve": "CVE-2023-24580", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2023-24580" }, { "cve": "CVE-2023-23969", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2023-23969" }, { "cve": "CVE-2023-23946", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2023-23946" }, { "cve": "CVE-2023-23936", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2023-23936" }, { "cve": "CVE-2023-23920", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2023-23920" }, { "cve": "CVE-2023-23919", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2023-23919" }, { "cve": "CVE-2023-23918", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2023-23918" }, { "cve": "CVE-2023-23605", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2023-23605" }, { "cve": "CVE-2023-23603", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2023-23603" }, { "cve": "CVE-2023-23602", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2023-23602" }, { "cve": "CVE-2023-23601", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2023-23601" }, { "cve": "CVE-2023-23599", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2023-23599" }, { "cve": "CVE-2023-23598", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2023-23598" }, { "cve": "CVE-2023-22809", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2023-22809" }, { "cve": "CVE-2023-22490", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2023-22490" }, { "cve": "CVE-2023-22003", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2023-22003" }, { "cve": "CVE-2023-21985", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2023-21985" }, { "cve": "CVE-2023-21984", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2023-21984" }, { "cve": "CVE-2023-21928", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2023-21928" }, { "cve": "CVE-2023-21896", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2023-21896" }, { "cve": "CVE-2023-21843", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2023-21843" }, { "cve": "CVE-2023-21840", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2023-21840" }, { "cve": "CVE-2023-21830", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2023-21830" }, { "cve": "CVE-2023-0804", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2023-0804" }, { "cve": "CVE-2023-0803", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2023-0803" }, { "cve": "CVE-2023-0802", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2023-0802" }, { "cve": "CVE-2023-0801", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2023-0801" }, { "cve": "CVE-2023-0800", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2023-0800" }, { "cve": "CVE-2023-0799", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2023-0799" }, { "cve": "CVE-2023-0798", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2023-0798" }, { "cve": "CVE-2023-0797", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2023-0797" }, { "cve": "CVE-2023-0796", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2023-0796" }, { "cve": "CVE-2023-0795", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2023-0795" }, { "cve": "CVE-2023-0767", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2023-0767" }, { "cve": "CVE-2023-0662", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2023-0662" }, { "cve": "CVE-2023-0616", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2023-0616" }, { "cve": "CVE-2023-0568", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2023-0568" }, { "cve": "CVE-2023-0567", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2023-0567" }, { "cve": "CVE-2023-0430", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2023-0430" }, { "cve": "CVE-2023-0417", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2023-0417" }, { "cve": "CVE-2023-0416", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2023-0416" }, { "cve": "CVE-2023-0415", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2023-0415" }, { "cve": "CVE-2023-0414", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2023-0414" }, { "cve": "CVE-2023-0413", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2023-0413" }, { "cve": "CVE-2023-0412", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2023-0412" }, { "cve": "CVE-2023-0411", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2023-0411" }, { "cve": "CVE-2023-0401", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2023-0401" }, { "cve": "CVE-2023-0286", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2023-0286" }, { "cve": "CVE-2023-0217", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2023-0217" }, { "cve": "CVE-2023-0216", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2023-0216" }, { "cve": "CVE-2023-0215", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2023-0215" }, { "cve": "CVE-2022-48281", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2022-48281" }, { "cve": "CVE-2022-46877", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2022-46877" }, { "cve": "CVE-2022-46874", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2022-46874" }, { "cve": "CVE-2022-46871", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2022-46871" }, { "cve": "CVE-2022-46344", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2022-46344" }, { "cve": "CVE-2022-46343", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2022-46343" }, { "cve": "CVE-2022-46342", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2022-46342" }, { "cve": "CVE-2022-46341", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2022-46341" }, { "cve": "CVE-2022-46340", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2022-46340" }, { "cve": "CVE-2022-45939", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2022-45939" }, { "cve": "CVE-2022-45199", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2022-45199" }, { "cve": "CVE-2022-45143", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2022-45143" }, { "cve": "CVE-2022-4450", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2022-4450" }, { "cve": "CVE-2022-4345", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2022-4345" }, { "cve": "CVE-2022-4304", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2022-4304" }, { "cve": "CVE-2022-42919", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2022-42919" }, { "cve": "CVE-2022-42916", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2022-42916" }, { "cve": "CVE-2022-42915", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2022-42915" }, { "cve": "CVE-2022-42898", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2022-42898" }, { "cve": "CVE-2022-4283", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2022-4283" }, { "cve": "CVE-2022-4203", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2022-4203" }, { "cve": "CVE-2022-42012", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2022-42012" }, { "cve": "CVE-2022-42011", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2022-42011" }, { "cve": "CVE-2022-42010", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2022-42010" }, { "cve": "CVE-2022-41903", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2022-41903" }, { "cve": "CVE-2022-41716", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2022-41716" }, { "cve": "CVE-2022-41715", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2022-41715" }, { "cve": "CVE-2022-40898", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2022-40898" }, { "cve": "CVE-2022-40304", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2022-40304" }, { "cve": "CVE-2022-40303", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2022-40303" }, { "cve": "CVE-2022-39253", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2022-39253" }, { "cve": "CVE-2022-3924", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2022-3924" }, { "cve": "CVE-2022-38784", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2022-38784" }, { "cve": "CVE-2022-38171", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2022-38171" }, { "cve": "CVE-2022-37436", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2022-37436" }, { "cve": "CVE-2022-3736", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2022-3736" }, { "cve": "CVE-2022-3705", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2022-3705" }, { "cve": "CVE-2022-36760", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2022-36760" }, { "cve": "CVE-2022-36227", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2022-36227" }, { "cve": "CVE-2022-36114", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2022-36114" }, { "cve": "CVE-2022-36113", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2022-36113" }, { "cve": "CVE-2022-35260", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2022-35260" }, { "cve": "CVE-2022-35252", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2022-35252" }, { "cve": "CVE-2022-3515", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2022-3515" }, { "cve": "CVE-2022-3352", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2022-3352" }, { "cve": "CVE-2022-3324", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2022-3324" }, { "cve": "CVE-2022-3297", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2022-3297" }, { "cve": "CVE-2022-3296", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2022-3296" }, { "cve": "CVE-2022-3278", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2022-3278" }, { "cve": "CVE-2022-3256", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2022-3256" }, { "cve": "CVE-2022-3235", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2022-3235" }, { "cve": "CVE-2022-3234", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2022-3234" }, { "cve": "CVE-2022-32221", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2022-32221" }, { "cve": "CVE-2022-32208", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2022-32208" }, { "cve": "CVE-2022-32207", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2022-32207" }, { "cve": "CVE-2022-32206", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2022-32206" }, { "cve": "CVE-2022-32205", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2022-32205" }, { "cve": "CVE-2022-32190", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2022-32190" }, { "cve": "CVE-2022-32189", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2022-32189" }, { "cve": "CVE-2022-32148", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2022-32148" }, { "cve": "CVE-2022-3153", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2022-3153" }, { "cve": "CVE-2022-3134", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2022-3134" }, { "cve": "CVE-2022-3099", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2022-3099" }, { "cve": "CVE-2022-3094", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2022-3094" }, { "cve": "CVE-2022-30635", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2022-30635" }, { "cve": "CVE-2022-30634", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2022-30634" }, { "cve": "CVE-2022-30633", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2022-30633" }, { "cve": "CVE-2022-30632", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2022-30632" }, { "cve": "CVE-2022-30631", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2022-30631" }, { "cve": "CVE-2022-30630", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2022-30630" }, { "cve": "CVE-2022-30629", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2022-30629" }, { "cve": "CVE-2022-30580", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2022-30580" }, { "cve": "CVE-2022-3037", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2022-3037" }, { "cve": "CVE-2022-3016", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2022-3016" }, { "cve": "CVE-2022-29804", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2022-29804" }, { "cve": "CVE-2022-2980", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2022-2980" }, { "cve": "CVE-2022-29526", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2022-29526" }, { "cve": "CVE-2022-2946", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2022-2946" }, { "cve": "CVE-2022-2929", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2022-2929" }, { "cve": "CVE-2022-2928", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2022-2928" }, { "cve": "CVE-2022-2923", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2022-2923" }, { "cve": "CVE-2022-2889", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2022-2889" }, { "cve": "CVE-2022-2880", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2022-2880" }, { "cve": "CVE-2022-2879", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2022-2879" }, { "cve": "CVE-2022-2874", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2022-2874" }, { "cve": "CVE-2022-2862", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2022-2862" }, { "cve": "CVE-2022-2849", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2022-2849" }, { "cve": "CVE-2022-2845", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2022-2845" }, { "cve": "CVE-2022-28331", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2022-28331" }, { "cve": "CVE-2022-28327", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2022-28327" }, { "cve": "CVE-2022-2819", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2022-2819" }, { "cve": "CVE-2022-2817", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2022-2817" }, { "cve": "CVE-2022-2816", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2022-2816" }, { "cve": "CVE-2022-28131", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2022-28131" }, { "cve": "CVE-2022-27778", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2022-27778" }, { "cve": "CVE-2022-27664", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2022-27664" }, { "cve": "CVE-2022-27536", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2022-27536" }, { "cve": "CVE-2022-27337", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2022-27337" }, { "cve": "CVE-2022-25255", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2022-25255" }, { "cve": "CVE-2022-25147", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2022-25147" }, { "cve": "CVE-2022-24963", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2022-24963" }, { "cve": "CVE-2022-24675", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2022-24675" }, { "cve": "CVE-2022-23521", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2022-23521" }, { "cve": "CVE-2022-2309", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2022-2309" }, { "cve": "CVE-2022-21515", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2022-21515" }, { "cve": "CVE-2022-21349", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2022-21349" }, { "cve": "CVE-2022-21291", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2022-21291" }, { "cve": "CVE-2022-1962", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2022-1962" }, { "cve": "CVE-2022-1705", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2022-1705" }, { "cve": "CVE-2022-1292", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2022-1292" }, { "cve": "CVE-2022-1122", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2022-1122" }, { "cve": "CVE-2022-0718", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2022-0718" }, { "cve": "CVE-2021-37750", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2021-37750" }, { "cve": "CVE-2021-37519", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2021-37519" }, { "cve": "CVE-2021-35940", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2021-35940" }, { "cve": "CVE-2021-30860", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2021-30860" }, { "cve": "CVE-2021-29338", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2021-29338" }, { "cve": "CVE-2018-25032", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2018-25032" }, { "cve": "CVE-2017-12613", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2017-12613" }, { "cve": "CVE-2006-20001", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2006-20001" } ] }
var-201710-0928
Vulnerability from variot
When apr_time_exp() or apr_os_exp_time() functions are invoked with an invalid month field value in Apache Portable Runtime APR 1.6.2 and prior, out of bounds memory may be accessed in converting this value to an apr_time_exp_t value, potentially revealing the contents of a different static heap value or resulting in program termination, and may represent an information disclosure or denial of service vulnerability to applications which call these APR functions with unvalidated external input. Apache Portable Runtime Contains a buffer error vulnerability.Information is obtained and service operation is interrupted (DoS) There is a possibility of being put into a state. Apache Portable Runtime Utility is prone to multiple information-disclosure vulnerabilities. An attacker can exploit these issues to obtain sensitive information that may aid in further attacks. Failed exploit attempts will result in denial-of-service conditions. Apache Portable Runtime Utility (APR-util) 1.6.2 and prior versions are vulnerable. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1
===================================================================== Red Hat Security Advisory
Synopsis: Important: apr security update Advisory ID: RHSA-2018:1253-01 Product: Red Hat Enterprise Linux Advisory URL: https://access.redhat.com/errata/RHSA-2018:1253 Issue date: 2018-04-26 CVE Names: CVE-2017-12613 =====================================================================
- Summary:
An update for apr is now available for Red Hat Enterprise Linux 6.4 Advanced Update Support, Red Hat Enterprise Linux 6.5 Advanced Update Support, Red Hat Enterprise Linux 6.6 Advanced Update Support, Red Hat Enterprise Linux 6.6 Telco Extended Update Support, Red Hat Enterprise Linux 6.7 Extended Update Support, Red Hat Enterprise Linux 7.2 Advanced Update Support, Red Hat Enterprise Linux 7.2 Telco Extended Update Support, Red Hat Enterprise Linux 7.2 Update Services for SAP Solutions, and Red Hat Enterprise Linux 7.3 Extended Update Support.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
- Relevant releases/architectures:
Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3) - x86_64 Red Hat Enterprise Linux HPC Node EUS (v. 6.7) - x86_64 Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7) - x86_64 Red Hat Enterprise Linux Server AUS (v. 6.4) - x86_64 Red Hat Enterprise Linux Server AUS (v. 6.5) - x86_64 Red Hat Enterprise Linux Server AUS (v. 6.6) - x86_64 Red Hat Enterprise Linux Server AUS (v. 7.2) - x86_64 Red Hat Enterprise Linux Server E4S (v. 7.2) - ppc64le, x86_64 Red Hat Enterprise Linux Server EUS (v. 6.7) - i386, ppc64, s390x, x86_64 Red Hat Enterprise Linux Server EUS (v. 7.3) - ppc64, ppc64le, s390x, x86_64 Red Hat Enterprise Linux Server TUS (v. 6.6) - x86_64 Red Hat Enterprise Linux Server TUS (v. 7.2) - x86_64
- Description:
The Apache Portable Runtime (APR) is a portability library used by the Apache HTTP Server and other projects. It provides a free library of C data structures and routines.
Security Fix(es):
- apr: Out-of-bounds array deref in apr_time_exp*() functions (CVE-2017-12613)
For more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section.
- Solution:
For details on how to apply this update, which includes the changes described in this advisory, refer to:
https://access.redhat.com/articles/11258
Applications using the APR libraries, such as httpd, must be restarted for this update to take effect.
- Bugs fixed (https://bugzilla.redhat.com/):
1506523 - CVE-2017-12613 apr: Out-of-bounds array deref in apr_time_exp*() functions
- Package List:
Red Hat Enterprise Linux HPC Node EUS (v. 6.7):
Source: apr-1.3.9-5.el6_7.1.src.rpm
x86_64: apr-1.3.9-5.el6_7.1.i686.rpm apr-1.3.9-5.el6_7.1.x86_64.rpm apr-debuginfo-1.3.9-5.el6_7.1.i686.rpm apr-debuginfo-1.3.9-5.el6_7.1.x86_64.rpm
Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7):
x86_64: apr-debuginfo-1.3.9-5.el6_7.1.i686.rpm apr-debuginfo-1.3.9-5.el6_7.1.x86_64.rpm apr-devel-1.3.9-5.el6_7.1.i686.rpm apr-devel-1.3.9-5.el6_7.1.x86_64.rpm
Red Hat Enterprise Linux Server AUS (v. 6.4):
Source: apr-1.3.9-5.el6_4.1.src.rpm
x86_64: apr-1.3.9-5.el6_4.1.i686.rpm apr-1.3.9-5.el6_4.1.x86_64.rpm apr-debuginfo-1.3.9-5.el6_4.1.i686.rpm apr-debuginfo-1.3.9-5.el6_4.1.x86_64.rpm apr-devel-1.3.9-5.el6_4.1.i686.rpm apr-devel-1.3.9-5.el6_4.1.x86_64.rpm
Red Hat Enterprise Linux Server AUS (v. 6.5):
Source: apr-1.3.9-5.el6_5.1.src.rpm
x86_64: apr-1.3.9-5.el6_5.1.i686.rpm apr-1.3.9-5.el6_5.1.x86_64.rpm apr-debuginfo-1.3.9-5.el6_5.1.i686.rpm apr-debuginfo-1.3.9-5.el6_5.1.x86_64.rpm apr-devel-1.3.9-5.el6_5.1.i686.rpm apr-devel-1.3.9-5.el6_5.1.x86_64.rpm
Red Hat Enterprise Linux Server AUS (v. 6.6):
Source: apr-1.3.9-5.el6_6.1.src.rpm
x86_64: apr-1.3.9-5.el6_6.1.i686.rpm apr-1.3.9-5.el6_6.1.x86_64.rpm apr-debuginfo-1.3.9-5.el6_6.1.i686.rpm apr-debuginfo-1.3.9-5.el6_6.1.x86_64.rpm apr-devel-1.3.9-5.el6_6.1.i686.rpm apr-devel-1.3.9-5.el6_6.1.x86_64.rpm
Red Hat Enterprise Linux Server TUS (v. 6.6):
Source: apr-1.3.9-5.el6_6.1.src.rpm
x86_64: apr-1.3.9-5.el6_6.1.i686.rpm apr-1.3.9-5.el6_6.1.x86_64.rpm apr-debuginfo-1.3.9-5.el6_6.1.i686.rpm apr-debuginfo-1.3.9-5.el6_6.1.x86_64.rpm apr-devel-1.3.9-5.el6_6.1.i686.rpm apr-devel-1.3.9-5.el6_6.1.x86_64.rpm
Red Hat Enterprise Linux Server EUS (v. 6.7):
Source: apr-1.3.9-5.el6_7.1.src.rpm
i386: apr-1.3.9-5.el6_7.1.i686.rpm apr-debuginfo-1.3.9-5.el6_7.1.i686.rpm apr-devel-1.3.9-5.el6_7.1.i686.rpm
ppc64: apr-1.3.9-5.el6_7.1.ppc.rpm apr-1.3.9-5.el6_7.1.ppc64.rpm apr-debuginfo-1.3.9-5.el6_7.1.ppc.rpm apr-debuginfo-1.3.9-5.el6_7.1.ppc64.rpm apr-devel-1.3.9-5.el6_7.1.ppc.rpm apr-devel-1.3.9-5.el6_7.1.ppc64.rpm
s390x: apr-1.3.9-5.el6_7.1.s390.rpm apr-1.3.9-5.el6_7.1.s390x.rpm apr-debuginfo-1.3.9-5.el6_7.1.s390.rpm apr-debuginfo-1.3.9-5.el6_7.1.s390x.rpm apr-devel-1.3.9-5.el6_7.1.s390.rpm apr-devel-1.3.9-5.el6_7.1.s390x.rpm
x86_64: apr-1.3.9-5.el6_7.1.i686.rpm apr-1.3.9-5.el6_7.1.x86_64.rpm apr-debuginfo-1.3.9-5.el6_7.1.i686.rpm apr-debuginfo-1.3.9-5.el6_7.1.x86_64.rpm apr-devel-1.3.9-5.el6_7.1.i686.rpm apr-devel-1.3.9-5.el6_7.1.x86_64.rpm
Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3):
Source: apr-1.4.8-3.el7_3.1.src.rpm
x86_64: apr-1.4.8-3.el7_3.1.i686.rpm apr-1.4.8-3.el7_3.1.x86_64.rpm apr-debuginfo-1.4.8-3.el7_3.1.i686.rpm apr-debuginfo-1.4.8-3.el7_3.1.x86_64.rpm apr-devel-1.4.8-3.el7_3.1.i686.rpm apr-devel-1.4.8-3.el7_3.1.x86_64.rpm
Red Hat Enterprise Linux Server AUS (v. 7.2):
Source: apr-1.4.8-3.el7_2.1.src.rpm
x86_64: apr-1.4.8-3.el7_2.1.i686.rpm apr-1.4.8-3.el7_2.1.x86_64.rpm apr-debuginfo-1.4.8-3.el7_2.1.i686.rpm apr-debuginfo-1.4.8-3.el7_2.1.x86_64.rpm apr-devel-1.4.8-3.el7_2.1.i686.rpm apr-devel-1.4.8-3.el7_2.1.x86_64.rpm
Red Hat Enterprise Linux Server E4S (v. 7.2):
Source: apr-1.4.8-3.el7_2.1.src.rpm
ppc64le: apr-1.4.8-3.el7_2.1.ppc64le.rpm apr-debuginfo-1.4.8-3.el7_2.1.ppc64le.rpm apr-devel-1.4.8-3.el7_2.1.ppc64le.rpm
x86_64: apr-1.4.8-3.el7_2.1.i686.rpm apr-1.4.8-3.el7_2.1.x86_64.rpm apr-debuginfo-1.4.8-3.el7_2.1.i686.rpm apr-debuginfo-1.4.8-3.el7_2.1.x86_64.rpm apr-devel-1.4.8-3.el7_2.1.i686.rpm apr-devel-1.4.8-3.el7_2.1.x86_64.rpm
Red Hat Enterprise Linux Server TUS (v. 7.2):
Source: apr-1.4.8-3.el7_2.1.src.rpm
x86_64: apr-1.4.8-3.el7_2.1.i686.rpm apr-1.4.8-3.el7_2.1.x86_64.rpm apr-debuginfo-1.4.8-3.el7_2.1.i686.rpm apr-debuginfo-1.4.8-3.el7_2.1.x86_64.rpm apr-devel-1.4.8-3.el7_2.1.i686.rpm apr-devel-1.4.8-3.el7_2.1.x86_64.rpm
Red Hat Enterprise Linux Server EUS (v. 7.3):
Source: apr-1.4.8-3.el7_3.1.src.rpm
ppc64: apr-1.4.8-3.el7_3.1.ppc.rpm apr-1.4.8-3.el7_3.1.ppc64.rpm apr-debuginfo-1.4.8-3.el7_3.1.ppc.rpm apr-debuginfo-1.4.8-3.el7_3.1.ppc64.rpm apr-devel-1.4.8-3.el7_3.1.ppc.rpm apr-devel-1.4.8-3.el7_3.1.ppc64.rpm
ppc64le: apr-1.4.8-3.el7_3.1.ppc64le.rpm apr-debuginfo-1.4.8-3.el7_3.1.ppc64le.rpm apr-devel-1.4.8-3.el7_3.1.ppc64le.rpm
s390x: apr-1.4.8-3.el7_3.1.s390.rpm apr-1.4.8-3.el7_3.1.s390x.rpm apr-debuginfo-1.4.8-3.el7_3.1.s390.rpm apr-debuginfo-1.4.8-3.el7_3.1.s390x.rpm apr-devel-1.4.8-3.el7_3.1.s390.rpm apr-devel-1.4.8-3.el7_3.1.s390x.rpm
x86_64: apr-1.4.8-3.el7_3.1.i686.rpm apr-1.4.8-3.el7_3.1.x86_64.rpm apr-debuginfo-1.4.8-3.el7_3.1.i686.rpm apr-debuginfo-1.4.8-3.el7_3.1.x86_64.rpm apr-devel-1.4.8-3.el7_3.1.i686.rpm apr-devel-1.4.8-3.el7_3.1.x86_64.rpm
These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/
- References:
https://access.redhat.com/security/cve/CVE-2017-12613 https://access.redhat.com/security/updates/classification/#important
- Contact:
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/
Copyright 2018 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1
iD8DBQFa4j0lXlSAg2UNWIIRAq05AJ4pwwTLE6OnsWgsL1xxge5Zz+C28ACdHRHQ w0VT8MLHcQqKdXFiVKYYrrE= =mjXk -----END PGP SIGNATURE-----
-- RHSA-announce mailing list RHSA-announce@redhat.com https://www.redhat.com/mailman/listinfo/rhsa-announce . -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256
APPLE-SA-2018-10-30-9 Additional information for APPLE-SA-2018-9-24-1 macOS Mojave 10.14
macOS Mojave 10.14 addresses the following:
Bluetooth Available for: iMac (21.5-inch, Late 2012), iMac (27-inch, Late 2012) , iMac (21.5-inch, Late 2013), iMac (21.5-inch, Mid 2014), iMac (Retina 5K, 27-inch, Late 2014), iMac (21.5-inch, Late 2015), Mac mini (Mid 2011), Mac mini Server (Mid 2011), Mac mini (Late 2012) , Mac mini Server (Late 2012), Mac mini (Late 2014), Mac Pro (Late 2013), MacBook Air (11-inch, Mid 2011), MacBook Air (13-inch, Mid 2011), MacBook Air (11-inch, Mid 2012), MacBook Air (13-inch, Mid 2012), MacBook Air (11-inch, Mid 2013), MacBook Air (13-inch, Mid 2013), MacBook Air (11-inch, Early 2015), MacBook Air (13-inch, Early 2015), MacBook Pro (13-inch, Mid 2012), MacBook Pro (15-inch, Mid 2012), MacBook Pro (Retina, 13-inch, Early 2013), MacBook Pro (Retina, 15-inch, Early 2013), MacBook Pro (Retina, 13-inch, Late 2013), and MacBook Pro (Retina, 15-inch, Late 2013) Impact: An attacker in a privileged network position may be able to intercept Bluetooth traffic Description: An input validation issue existed in Bluetooth. This issue was addressed with improved input validation. CVE-2018-5383: Lior Neumann and Eli Biham
The updates below are available for these Mac models: MacBook (Early 2015 and later), MacBook Air (Mid 2012 and later), MacBook Pro (Mid 2012 and later), Mac mini (Late 2012 and later), iMac (Late 2012 and later), iMac Pro (all models), Mac Pro (Late 2013, Mid 2010, and Mid 2012 models with recommended Metal-capable graphics processor, including MSI Gaming Radeon RX 560 and Sapphire Radeon PULSE RX 580)
afpserver Impact: A remote attacker may be able to attack AFP servers through HTTP clients Description: An input validation issue was addressed with improved input validation. CVE-2018-4295: Jianjun Chen (@whucjj) from Tsinghua University and UC Berkeley Entry added October 30, 2018
App Store Impact: A malicious application may be able to determine the Apple ID of the owner of the computer Description: A permissions issue existed in the handling of the Apple ID. This issue was addressed with improved access controls. CVE-2018-4324: Sergii Kryvoblotskyi of MacPaw Inc.
AppleGraphicsControl Impact: An application may be able to read restricted memory Description: A validation issue was addressed with improved input sanitization. CVE-2018-4417: Lee of the Information Security Lab Yonsei University working with Trend Micro's Zero Day Initiative Entry added October 30, 2018
Application Firewall Impact: A sandboxed process may be able to circumvent sandbox restrictions Description: A configuration issue was addressed with additional restrictions. CVE-2018-4353: Abhinav Bansal of LinkedIn Inc.
APR Impact: Multiple buffer overflow issues existed in Perl Description: Multiple issues in Perl were addressed with improved memory handling. CVE-2017-12613: Craig Young of Tripwire VERT CVE-2017-12618: Craig Young of Tripwire VERT Entry added October 30, 2018
ATS Impact: A malicious application may be able to elevate privileges Description: A memory corruption issue was addressed with improved input validation. CVE-2018-4411: lilang wu moony Li of Trend Micro working with Trend Micro's Zero Day Initiative Entry added October 30, 2018
ATS Impact: An application may be able to read restricted memory Description: An out-of-bounds read was addressed with improved bounds checking. CVE-2018-4308: Mohamed Ghannam (@_simo36) Entry added October 30, 2018
Auto Unlock Impact: A malicious application may be able to access local users AppleIDs Description: A validation issue existed in the entitlement verification. This issue was addressed with improved validation of the process entitlement. CVE-2018-4321: Min (Spark) Zheng, Xiaolong Bai of Alibaba Inc.
CFNetwork Impact: An application may be able to execute arbitrary code with system privileges Description: A memory corruption issue was addressed with improved memory handling. CVE-2018-4126: Bruno Keith (@bkth_) working with Trend Micro's Zero Day Initiative Entry added October 30, 2018
CoreFoundation Impact: A malicious application may be able to elevate privileges Description: A memory corruption issue was addressed with improved input validation. CVE-2018-4412: The UK's National Cyber Security Centre (NCSC) Entry added October 30, 2018
CoreFoundation Impact: An application may be able to gain elevated privileges Description: A memory corruption issue was addressed with improved input validation. CVE-2018-4414: The UK's National Cyber Security Centre (NCSC) Entry added October 30, 2018
CoreText Impact: Processing a maliciously crafted text file may lead to arbitrary code execution Description: A use after free issue was addressed with improved memory management. CVE-2018-4347: an anonymous researcher Entry added October 30, 2018
Crash Reporter Impact: An application may be able to read restricted memory Description: A validation issue was addressed with improved input sanitization. CVE-2018-4333: Brandon Azad
CUPS Impact: In certain configurations, a remote attacker may be able to replace the message content from the print server with arbitrary content Description: An injection issue was addressed with improved validation. CVE-2018-4153: Michael Hanselmann of hansmi.ch Entry added October 30, 2018
CUPS Impact: An attacker in a privileged position may be able to perform a denial of service attack Description: A denial of service issue was addressed with improved validation. CVE-2018-4406: Michael Hanselmann of hansmi.ch Entry added October 30, 2018
Dictionary Impact: Parsing a maliciously crafted dictionary file may lead to disclosure of user information Description: A validation issue existed which allowed local file access. This was addressed with input sanitization. CVE-2018-4346: Wojciech ReguAa (@_r3ggi) of SecuRing Entry added October 30, 2018
Grand Central Dispatch Impact: An application may be able to execute arbitrary code with system privileges Description: A memory corruption issue was addressed with improved memory handling. CVE-2018-4426: Brandon Azad Entry added October 30, 2018
Heimdal Impact: An application may be able to execute arbitrary code with system privileges Description: A memory corruption issue was addressed with improved memory handling. CVE-2018-4331: Brandon Azad CVE-2018-4332: Brandon Azad CVE-2018-4343: Brandon Azad Entry added October 30, 2018
Hypervisor Impact: Systems with microprocessors utilizing speculative execution and address translations may allow unauthorized disclosure of information residing in the L1 data cache to an attacker with local user access with guest OS privilege via a terminal page fault and a side-channel analysis Description: An information disclosure issue was addressed by flushing the L1 data cache at the virtual machine entry. CVE-2018-3646: Baris Kasikci, Daniel Genkin, Ofir Weisse, and Thomas F. Wenisch of University of Michigan, Mark Silberstein and Marina Minkin of Technion, Raoul Strackx, Jo Van Bulck, and Frank Piessens of KU Leuven, Rodrigo Branco, Henrique Kawakami, Ke Sun, and Kekai Hu of Intel Corporation, Yuval Yarom of The University of Adelaide Entry added October 30, 2018
iBooks Impact: Parsing a maliciously crafted iBooks file may lead to disclosure of user information Description: A configuration issue was addressed with additional restrictions. CVE-2018-4355: evi1m0 of bilibili security team Entry added October 30, 2018
Intel Graphics Driver Impact: An application may be able to read restricted memory Description: A validation issue was addressed with improved input sanitization. CVE-2018-4396: Yu Wang of Didi Research America CVE-2018-4418: Yu Wang of Didi Research America Entry added October 30, 2018
Intel Graphics Driver Impact: An application may be able to read restricted memory Description: A memory initialization issue was addressed with improved memory handling. CVE-2018-4351: Appology Team @ Theori working with Trend Micro's Zero Day Initiative Entry added October 30, 2018
Intel Graphics Driver Impact: An application may be able to execute arbitrary code with system privileges Description: A memory corruption issue was addressed with improved input validation. CVE-2018-4350: Yu Wang of Didi Research America Entry added October 30, 2018
Intel Graphics Driver Impact: An application may be able to execute arbitrary code with system privileges Description: A memory corruption issue was addressed with improved memory handling. CVE-2018-4334: Ian Beer of Google Project Zero Entry added October 30, 2018
IOHIDFamily Impact: A malicious application may be able to execute arbitrary code with kernel privileges Description: A memory corruption issue was addressed with improved input validation CVE-2018-4408: Ian Beer of Google Project Zero Entry added October 30, 2018
IOKit Impact: A malicious application may be able to break out of its sandbox Description: A memory corruption issue was addressed with improved memory handling. CVE-2018-4341: Ian Beer of Google Project Zero CVE-2018-4354: Ian Beer of Google Project Zero Entry added October 30, 2018
IOKit Impact: An application may be able to execute arbitrary code with kernel privileges Description: A memory corruption issue was addressed with improved state management. CVE-2018-4383: Apple Entry added October 30, 2018
IOUserEthernet Impact: An application may be able to execute arbitrary code with kernel privileges Description: A memory corruption issue was addressed with improved memory handling. CVE-2018-4401: Apple Entry added October 30, 2018
Kernel Impact: A malicious application may be able to leak sensitive user information Description: An access issue existed with privileged API calls. This issue was addressed with additional restrictions. CVE-2018-4399: Fabiano Anemone (@anoane) Entry added October 30, 2018
Kernel Impact: An attacker in a privileged network position may be able to execute arbitrary code Description: A memory corruption issue was addressed with improved validation. CVE-2018-4407: Kevin Backhouse of Semmle Ltd. Entry added October 30, 2018
Kernel Impact: An application may be able to execute arbitrary code with kernel privileges Description: A memory corruption issue was addressed with improved memory handling. CVE-2018-4336: Brandon Azad CVE-2018-4337: Ian Beer of Google Project Zero CVE-2018-4340: Mohamed Ghannam (@_simo36) CVE-2018-4344: The UK's National Cyber Security Centre (NCSC) CVE-2018-4425: cc working with Trend Micro's Zero Day Initiative, Juwei Lin (@panicaII) of Trend Micro working with Trend Micro's Zero Day Initiative Entry added October 30, 2018
LibreSSL Impact: Multiple issues in libressl were addressed in this update Description: Multiple issues were addressed by updating to libressl version 2.6.4. CVE-2015-3194 CVE-2015-5333 CVE-2015-5334 CVE-2016-702 Entry added October 30, 2018
Login Window Impact: A local user may be able to cause a denial of service Description: A validation issue was addressed with improved logic. CVE-2018-4348: Ken Gannon of MWR InfoSecurity and Christian Demko of MWR InfoSecurity Entry added October 30, 2018
mDNSOffloadUserClient Impact: An application may be able to execute arbitrary code with kernel privileges Description: A memory corruption issue was addressed with improved memory handling. CVE-2018-4326: an anonymous researcher working with Trend Micro's Zero Day Initiative, Zhuo Liang of Qihoo 360 Nirvan Team Entry added October 30, 2018
MediaRemote Impact: A sandboxed process may be able to circumvent sandbox restrictions Description: An access issue was addressed with additional sandbox restrictions. CVE-2018-4310: CodeColorist of Ant-Financial LightYear Labs Entry added October 30, 2018
Microcode Impact: Systems with microprocessors utilizing speculative execution and speculative execution of memory reads before the addresses of all prior memory writes are known may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis Description: An information disclosure issue was addressed with a microcode update. This ensures that older data read from recently-written-to addresses cannot be read via a speculative side-channel. CVE-2018-3639: Jann Horn (@tehjh) of Google Project Zero (GPZ), Ken Johnson of the Microsoft Security Response Center (MSRC) Entry added October 30, 2018
Security Impact: A local user may be able to cause a denial of service Description: This issue was addressed with improved checks. CVE-2018-4395: Patrick Wardle of Digita Security Entry added October 30, 2018
Security Impact: An attacker may be able to exploit weaknesses in the RC4 cryptographic algorithm Description: This issue was addressed by removing RC4. CVE-2016-1777: Pepi Zawodsky
Spotlight Impact: An application may be able to execute arbitrary code with system privileges Description: A memory corruption issue was addressed with improved memory handling. CVE-2018-4393: Lufeng Li Entry added October 30, 2018
Symptom Framework Impact: An application may be able to read restricted memory Description: An out-of-bounds read was addressed with improved bounds checking. CVE-2018-4203: Bruno Keith (@bkth_) working with Trend Micro's Zero Day Initiative Entry added October 30, 2018
Text Impact: Processing a maliciously crafted text file may lead to a denial of service Description: A denial of service issue was addressed with improved validation. CVE-2018-4304: jianan.huang (@Sevck) Entry added October 30, 2018
Wi-Fi Impact: An application may be able to read restricted memory Description: A validation issue was addressed with improved input sanitization. CVE-2018-4338: Lee @ SECLAB, Yonsei University working with Trend Micro's Zero Day Initiative Entry added October 30, 2018
Additional recognition
Accessibility Framework We would like to acknowledge Ryan Govostes for their assistance.
Core Data We would like to acknowledge Andreas Kurtz (@aykay) of NESO Security Labs GmbH for their assistance.
CoreDAV We would like to acknowledge an anonymous researcher for their assistance.
CoreGraphics We would like to acknowledge Nitin Arya of Roblox Corporation for their assistance.
CoreSymbolication We would like to acknowledge Brandon Azad for their assistance.
IOUSBHostFamily We would like to acknowledge an anonymous researcher for their assistance.
Kernel We would like to acknowledge Brandon Azad for their assistance.
Mail We would like to acknowledge Alessandro Avagliano of Rocket Internet SE, John Whitehead of The New York Times, Kelvin Delbarre of Omicron Software Systems, and Zbyszek A>>A3Akiewski for their assistance.
Quick Look We would like to acknowledge Wojciech ReguAa (@_r3ggi) of SecuRing and Patrick Wardle of Digita Security and lokihardt of Google Project Zero for their assistance.
Security We would like to acknowledge Christoph Sinai, Daniel Dudek (@dannysapples) of The Irish Times and Filip KlubiAka (@lemoncloak) of ADAPT Centre, Dublin Institute of Technology, Istvan Csanady of Shapr3D, Omar Barkawi of ITG Software, Inc., Phil Caleno, Wilson Ding, and an anonymous researcher for their assistance.
SQLite We would like to acknowledge Andreas Kurtz (@aykay) of NESO Security Labs GmbH for their assistance.
Terminal We would like to acknowledge an anonymous researcher for their assistance.
WindowServer We would like to acknowledge Patrick Wardle of Digita Security for their assistance.
Installation note:
macOS Mojave 10.14 may be obtained from the Mac App Store or Apple's Software Downloads web site: https://support.apple.com/downloads/
Information will also be posted to the Apple Security Updates web site: https://support.apple.com/kb/HT201222
This message is signed with Apple's Product Security PGP key, and details are available at: https://www.apple.com/support/security/pgp/ -----BEGIN PGP SIGNATURE-----
iQJdBAEBCABHFiEEDNXJVNCJJEAVmJdZeC9tht7TK3EFAlvYkgYpHHByb2R1Y3Qt c2VjdXJpdHktbm9yZXBseUBsaXN0cy5hcHBsZS5jb20ACgkQeC9tht7TK3GrtxAA iVBcAdusz88zFzkT05EIxb9nSp4CGOlhKlChK4N7Db17o2fNT0hNpQixEAC0wC/A zqIzsXEzZlPobI4OnwiEVs7lVBsvCW+IarrRZ8pgSllKs1VlbNfOO3z9vB5BqJMr d9PjPvtHyG3jZmWqQPIjvJb3l3ZjHAt+HAvTItNMkhIUjqV80JI8wP3erzIf3tAt VoLIw5iL5w4HAYcWsn9DYcecXZdv39MnKL5UGzMX3bkee2U7kGYtgskU+mdPa1Wl WzquIPlLeKL2KNSXEfbkPtcKM/fvkURsNzEDvg+PBQLdI3JeR1bOeN24aiTEtiEL TecGm/kKMMJWmDdhPhFvZVD+SIdZd4LgbTawR1UE1JJg7jnEZKCvZ45mXd2eBwn/ rpEKCLBsgA59GILs3ZjZSIWskRJPzZrt463AKcN2wukkTUUkY1rhRVdOf6LZMs9Z w9iJOua3vt+HzCCxTEaH53WUeM6fn/Yeq+DGIS5Fk0G09pU7tsyJVwj3o1nJn0dl e2mcrXBJeSmi6bvvkJX45y/Y8E8Qr+ovS4uN8wG6DOWcCBQkDkugabng8vNh8GST 1wNnV9JY/CmYbU0ZIwKbbSDkcQLQuIl7kKaZMHnU74EytcKscUqqx1VqINz1tssu 1wZZGLtg3VubrZOsnUZzumD+0nI8c6QAnQK3P2PSZ0k= =i9YR -----END PGP SIGNATURE----- . Solution:
Before applying the update, back up your existing Red Hat JBoss Web Server installation (including all applications and configuration files). Bugs fixed (https://bugzilla.redhat.com/):
1493220 - CVE-2017-12615 tomcat: Remote Code Execution via JSP Upload 1493222 - CVE-2017-12616 tomcat: Information Disclosure when using VirtualDirContext 1494283 - CVE-2017-12617 tomcat: Remote Code Execution bypass for CVE-2017-12615 1506523 - CVE-2017-12613 apr: Out-of-bounds array deref in apr_time_exp*() functions 1540824 - CVE-2017-15698 tomcat-native: Mishandling of client certificates can allow for OCSP check bypass 1548282 - CVE-2018-1305 tomcat: Late application of security constraints can lead to resource exposure for unauthorised users 1548289 - CVE-2018-1304 tomcat: Incorrect handling of empty string URL in security constraints can lead to unintended exposure of resources
The References section of this erratum contains a download link (you must log in to download the update). Summary:
An update is now available for JBoss Core Services on RHEL 7. This software, such as Apache HTTP Server, is common to multiple JBoss middleware products, and is packaged under Red Hat JBoss Core Services to allow for faster distribution of updates, and for a more consistent update experience.
This release of Red Hat JBoss Core Services Apache HTTP Server 2.4.23 Service Pack 3 serves as an update to Red Hat JBoss Core Services Apache HTTP Server 2.4.23 Service Pack 2, and includes bug fixes, which are documented in the Release Notes document linked to in the References.
Security Fix(es):
-
An out-of-bounds array dereference was found in apr_time_exp_get(). An attacker could abuse an unvalidated usage of this function to cause a denial of service or potentially lead to data leak. (CVE-2017-12613)
-
It was discovered that the use of httpd's ap_get_basic_auth_pw() API function outside of the authentication phase could lead to authentication bypass. A remote attacker could possibly use this flaw to bypass required authentication if the API was used incorrectly by one of the modules used by httpd. (CVE-2017-3167)
-
A NULL pointer dereference flaw was found in the httpd's mod_ssl module. A remote attacker could use this flaw to cause an httpd child process to crash if another module used by httpd called a certain API function during the processing of an HTTPS request. (CVE-2017-3169)
-
A buffer over-read flaw was found in the httpd's mod_mime module. A user permitted to modify httpd's MIME configuration could use this flaw to cause httpd child process to crash. (CVE-2017-7679)
-
A use-after-free flaw was found in the way httpd handled invalid and previously unregistered HTTP methods specified in the Limit directive used in an .htaccess file. A remote attacker could possibly use this flaw to disclose portions of the server memory, or cause httpd child process to crash. (CVE-2017-9798)
Red Hat would like to thank Hanno BAPck for reporting CVE-2017-9798. Bugs fixed (https://bugzilla.redhat.com/):
1463194 - CVE-2017-3167 httpd: ap_get_basic_auth_pw() authentication bypass 1463197 - CVE-2017-3169 httpd: mod_ssl NULL pointer dereference 1463207 - CVE-2017-7679 httpd: mod_mime buffer overread 1490344 - CVE-2017-9798 httpd: Use-after-free by limiting unregistered HTTP method (Optionsbleed) 1506523 - CVE-2017-12613 apr: Out-of-bounds array deref in apr_time_exp*() functions
- JIRA issues fixed (https://issues.jboss.org/):
JBCS-402 - Errata for httpd 2.4.23.SP3 RHEL7
- (CVE-2017-12613)
4
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201710-0928", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "enterprise linux eus", "scope": "eq", "trust": 1.0, "vendor": "redhat", "version": "7.6" }, { "model": "enterprise linux server aus", "scope": "eq", "trust": 1.0, "vendor": "redhat", "version": "6.6" }, { "model": "linux", "scope": "eq", "trust": 1.0, "vendor": "debian", "version": "7.0" }, { "model": "software collections", "scope": "eq", "trust": 1.0, "vendor": "redhat", "version": "1.0" }, { "model": "enterprise linux server aus", "scope": "eq", "trust": 1.0, "vendor": "redhat", "version": "7.2" }, { "model": "enterprise linux server tus", "scope": "eq", "trust": 1.0, "vendor": "redhat", "version": "6.6" }, { "model": "enterprise linux eus", "scope": "eq", "trust": 1.0, "vendor": "redhat", "version": "7.4" }, { "model": "enterprise linux server tus", "scope": "eq", "trust": 1.0, "vendor": "redhat", "version": "7.2" }, { "model": "linux", "scope": "eq", "trust": 1.0, "vendor": "debian", "version": "9.0" }, { "model": "portable runtime", "scope": "lt", "trust": 1.0, "vendor": "apache", "version": "1.7.0" }, { "model": "enterprise linux server aus", "scope": "eq", "trust": 1.0, "vendor": "redhat", "version": "7.6" }, { "model": "enterprise linux eus", "scope": "eq", "trust": 1.0, "vendor": "redhat", "version": "7.7" }, { "model": "enterprise linux server", "scope": "eq", "trust": 1.0, "vendor": "redhat", "version": "6.0" }, { "model": "enterprise linux server aus", "scope": "eq", "trust": 1.0, "vendor": "redhat", "version": "6.5" }, { "model": "enterprise linux server aus", "scope": "eq", "trust": 1.0, "vendor": "redhat", "version": "7.4" }, { "model": "enterprise linux server tus", "scope": "eq", "trust": 1.0, "vendor": "redhat", "version": "7.6" }, { "model": "enterprise linux server", "scope": "eq", "trust": 1.0, "vendor": "redhat", "version": "7.0" }, { "model": "enterprise linux eus", "scope": "eq", "trust": 1.0, "vendor": "redhat", "version": "7.3" }, { "model": "enterprise linux workstation", "scope": "eq", "trust": 1.0, "vendor": "redhat", "version": "7.0" }, { "model": "jboss core services", "scope": "eq", "trust": 1.0, "vendor": "redhat", "version": "1.0" }, { "model": "enterprise linux eus", "scope": "eq", "trust": 1.0, "vendor": "redhat", "version": "6.7" }, { "model": "enterprise linux server aus", "scope": "eq", "trust": 1.0, "vendor": "redhat", "version": "7.7" }, { "model": "enterprise linux server tus", "scope": "eq", "trust": 1.0, "vendor": "redhat", "version": "7.4" }, { "model": "enterprise linux workstation", "scope": "eq", "trust": 1.0, "vendor": "redhat", "version": "6.0" }, { "model": "enterprise linux server aus", "scope": "eq", "trust": 1.0, "vendor": "redhat", "version": "6.4" }, { "model": "enterprise linux server aus", "scope": "eq", "trust": 1.0, "vendor": "redhat", "version": "7.3" }, { "model": "jboss core services", "scope": "eq", "trust": 1.0, "vendor": "redhat", "version": null }, { "model": "enterprise linux eus", "scope": "eq", "trust": 1.0, "vendor": "redhat", "version": "7.5" }, { "model": "enterprise linux desktop", "scope": "eq", "trust": 1.0, "vendor": "redhat", "version": "6.0" }, { "model": "enterprise linux server tus", "scope": "eq", "trust": 1.0, "vendor": "redhat", "version": "7.7" }, { "model": "enterprise linux server tus", "scope": "eq", "trust": 1.0, "vendor": "redhat", "version": "7.3" }, { "model": "enterprise linux desktop", "scope": "eq", "trust": 1.0, "vendor": "redhat", "version": "7.0" }, { "model": "jboss enterprise web server", "scope": "eq", "trust": 1.0, "vendor": "redhat", "version": "3.0.0" }, { "model": "portable runtime", "scope": "lte", "trust": 0.8, "vendor": "apache", "version": "apr 1.6.2" }, { "model": "portable runtime", "scope": "eq", "trust": 0.6, "vendor": "apache", "version": "1.6.2" }, { "model": "iworkflow", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "2.3" }, { "model": "iworkflow", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "2.2" }, { "model": "iworkflow", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "2.0.1" }, { "model": "enterprise manager", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "3.1.1" }, { "model": "big-iq cloud and orchestration", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "1.0" }, { "model": "big-iq centralized management", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "6.0.1" }, { "model": "big-iq centralized management", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "6.0" }, { "model": "big-iq centralized management", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "5.4" }, { "model": "big-iq centralized management", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "5.3" }, { "model": "big-iq centralized management", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "5.2" }, { "model": "big-iq centralized management", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "5.1" }, { "model": "big-iq centralized management", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "5.0" }, { "model": "big-iq centralized management", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "4.6" }, { "model": "big-ip websafe", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "14.0" }, { "model": "big-ip websafe", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "13.1" }, { "model": "big-ip websafe", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "13.0.1" }, { "model": "big-ip websafe hf3", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "13.0" }, { "model": "big-ip websafe hf2", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "13.0" }, { "model": "big-ip websafe", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "13.0" }, { "model": "big-ip websafe", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "12.1.3" }, { "model": "big-ip websafe hf2", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "12.1.2" }, { "model": "big-ip websafe hf1", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "12.1.2" }, { "model": "big-ip websafe", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "12.1.2" }, { "model": "big-ip websafe", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "12.1.1" }, { "model": "big-ip websafe hf2", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "12.1" }, { "model": "big-ip websafe hf1", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "12.1" }, { "model": "big-ip websafe", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "12.1" }, { "model": "big-ip websafe", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.6.3" }, { "model": "big-ip websafe hf1", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.6.2" }, { "model": "big-ip websafe", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.6.2" }, { "model": "big-ip websafe hf1", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.6.1" }, { "model": "big-ip websafe", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.6.1" }, { "model": "big-ip websafe", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.5.7" }, { "model": "big-ip websafe", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.5.6" }, { "model": "big-ip websafe", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.5.5" }, { "model": "big-ip websafe", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.5.4" }, { "model": "big-ip websafe", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.5.3" }, { "model": "big-ip websafe", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.5.2" }, { "model": "big-ip websafe", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.2.1" }, { "model": "big-ip websafe hf1", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "13.0.0" }, { "model": "big-ip websafe hf2", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.6.1" }, { "model": "big-ip websafe", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.5.1" }, { "model": "big-ip webaccelerator", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "14.0" }, { "model": "big-ip webaccelerator", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "13.1" }, { "model": "big-ip webaccelerator", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "13.0.1" }, { "model": "big-ip webaccelerator", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "13.0" }, { "model": "big-ip webaccelerator", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "12.1.3" }, { "model": "big-ip webaccelerator", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "12.1.2" }, { "model": "big-ip webaccelerator", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "12.1.1" }, { "model": "big-ip webaccelerator", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "12.1" }, { "model": "big-ip webaccelerator", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.6.3" }, { "model": "big-ip webaccelerator", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.6.2" }, { "model": "big-ip webaccelerator", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.6.1" }, { "model": "big-ip webaccelerator", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.5.7" }, { "model": "big-ip webaccelerator", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.5.6" }, { "model": "big-ip webaccelerator", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.5.5" }, { "model": "big-ip webaccelerator hf2", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.5.4" }, { "model": "big-ip webaccelerator", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.5.1" }, { "model": "big-ip webaccelerator", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.2.1" }, { "model": "big-ip pem", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "14.0" }, { "model": "big-ip pem", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "13.1" }, { "model": "big-ip pem", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "13.0.1" }, { "model": "big-ip pem hf3", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "13.0" }, { "model": "big-ip pem hf2", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "13.0" }, { "model": "big-ip pem", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "13.0" }, { "model": "big-ip pem", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "12.1.3" }, { "model": "big-ip pem hf2", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "12.1.2" }, { "model": "big-ip pem hf1", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "12.1.2" }, { "model": "big-ip pem hf", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "12.1.21" }, { "model": "big-ip pem", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "12.1.2" }, { "model": "big-ip pem", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "12.1.1" }, { "model": "big-ip pem hf2", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "12.1" }, { "model": "big-ip pem hf1", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "12.1" }, { "model": "big-ip pem", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.6.3" }, { "model": "big-ip pem hf1", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.6.2" }, { "model": "big-ip pem", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.6.2" }, { "model": "big-ip pem hf2", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.6.1" }, { "model": "big-ip pem hf1", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.6.1" }, { "model": "big-ip pem", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.6.1" }, { "model": "big-ip pem", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.5.7" }, { "model": "big-ip pem", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.5.6" }, { "model": "big-ip pem hf3", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.5.4" }, { "model": "big-ip pem hf2", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.5.4" }, { "model": "big-ip pem hf1", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.5.4" }, { "model": "big-ip pem hf2", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.5.3" }, { "model": "big-ip pem", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.5.3" }, { "model": "big-ip pem hf11", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.5.1" }, { "model": "big-ip pem hf10", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.5.1" }, { "model": "big-ip pem", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.5.1" }, { "model": "big-ip pem", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.2.1" }, { "model": "big-ip pem hf1", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "13.0.0" }, { "model": "big-ip pem", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "12.1.0" }, { "model": "big-ip pem", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.5.5" }, { "model": "big-ip pem", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.5.4" }, { "model": "big-ip pem hf1", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.5.3" }, { "model": "big-ip pem hf6", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.5.1" }, { "model": "big-ip ltm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "14.0" }, { "model": "big-ip ltm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "13.1" }, { "model": "big-ip ltm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "13.0.1" }, { "model": "big-ip ltm hf3", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "13.0" }, { "model": "big-ip ltm hf2", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "13.0" }, { "model": "big-ip ltm hf1", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "13.0" }, { "model": "big-ip ltm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "13.0" }, { "model": "big-ip ltm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "12.1.3" }, { "model": "big-ip ltm hf2", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "12.1.2" }, { "model": "big-ip ltm hf1", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "12.1.2" }, { "model": "big-ip ltm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "12.1.2" }, { "model": "big-ip ltm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "12.1.1" }, { "model": "big-ip ltm hf2", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "12.1" }, { "model": "big-ip ltm hf1", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "12.1" }, { "model": "big-ip ltm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.6.3" }, { "model": "big-ip ltm hf1", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.6.2" }, { "model": "big-ip ltm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.6.2" }, { "model": "big-ip ltm hf2", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.6.1" }, { "model": "big-ip ltm hf1", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.6.1" }, { "model": "big-ip ltm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.6.1" }, { "model": "big-ip ltm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.5.7" }, { "model": "big-ip ltm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.5.6" }, { "model": "big-ip ltm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.5.5" }, { "model": "big-ip ltm hf3", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.5.4" }, { "model": "big-ip ltm hf2", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.5.4" }, { "model": "big-ip ltm hf1", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.5.4" }, { "model": "big-ip ltm hf2", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.5.3" }, { "model": "big-ip ltm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.5.3" }, { "model": "big-ip ltm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.5.2" }, { "model": "big-ip ltm hf6", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.5.1" }, { "model": "big-ip ltm hf5", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.5.1" }, { "model": "big-ip ltm hf11", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.5.1" }, { "model": "big-ip ltm hf10", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.5.1" }, { "model": "big-ip ltm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.5.1" }, { "model": "big-ip ltm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "12.1.0" }, { "model": "big-ip ltm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.5.4" }, { "model": "big-ip ltm hf1", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.5.3" }, { "model": "big-ip ltm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.2.1" }, { "model": "big-ip link controller", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "14.0" }, { "model": "big-ip link controller", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "13.1" }, { "model": "big-ip link controller", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "13.0.1" }, { "model": "big-ip link controller hf3", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "13.0" }, { "model": "big-ip link controller hf2", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "13.0" }, { "model": "big-ip link controller", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "13.0" }, { "model": "big-ip link controller", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "12.1.3" }, { "model": "big-ip link controller hf2", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "12.1.2" }, { "model": "big-ip link controller hf1", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "12.1.2" }, { "model": "big-ip link controller", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "12.1.2" }, { "model": "big-ip link controller", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "12.1.1" }, { "model": "big-ip link controller hf2", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "12.1" }, { "model": "big-ip link controller hf1", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "12.1" }, { "model": "big-ip link controller", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.6.3" }, { "model": "big-ip link controller hf2", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.6.1" }, { "model": "big-ip link controller hf1", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.6.1" }, { "model": "big-ip link controller", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.5.7" }, { "model": "big-ip link controller", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.5.6" }, { "model": "big-ip link controller hf3", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.5.4" }, { "model": "big-ip link controller hf2", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.5.4" }, { "model": "big-ip link controller hf1", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.5.4" }, { "model": "big-ip link controller hf2", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.5.3" }, { "model": "big-ip link controller", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.5.3" }, { "model": "big-ip link controller", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.5.2" }, { "model": "big-ip link controller hf8", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.5.1" }, { "model": "big-ip link controller hf11", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.5.1" }, { "model": "big-ip link controller hf10", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.5.1" }, { "model": "big-ip link controller", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.5.1" }, { "model": "big-ip link controller", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.2.1" }, { "model": "big-ip link controller hf1", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "13.0.0" }, { "model": "big-ip link controller", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "12.1.0" }, { "model": "big-ip link controller hf1", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.6.2" }, { "model": "big-ip link controller", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.6.2" }, { "model": "big-ip link controller", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.6.1" }, { "model": "big-ip link controller", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.5.5" }, { "model": "big-ip link controller", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.5.4" }, { "model": "big-ip link controller hf1", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.5.3" }, { "model": "big-ip gtm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "14.0" }, { "model": "big-ip gtm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "13.1" }, { "model": "big-ip gtm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "13.0.1" }, { "model": "big-ip gtm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "12.1.3" }, { "model": "big-ip gtm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "12.1.2" }, { "model": "big-ip gtm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "12.1.1" }, { "model": "big-ip gtm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "12.1" }, { "model": "big-ip gtm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.6.3" }, { "model": "big-ip gtm hf1", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.6.2" }, { "model": "big-ip gtm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.6.2" }, { "model": "big-ip gtm hf1", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.6.1" }, { "model": "big-ip gtm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.6.1" }, { "model": "big-ip gtm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.5.7" }, { "model": "big-ip gtm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.5.6" }, { "model": "big-ip gtm hf3", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.5.4" }, { "model": "big-ip gtm hf2", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.5.4" }, { "model": "big-ip gtm hf1", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.5.4" }, { "model": "big-ip gtm hf2", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.5.3" }, { "model": "big-ip gtm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.5.3" }, { "model": "big-ip gtm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.5.2" }, { "model": "big-ip gtm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.5.1" }, { "model": "big-ip gtm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "13.0.0" }, { "model": "big-ip gtm hf1", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "12.1.2" }, { "model": "big-ip gtm hf2", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.6.1" }, { "model": "big-ip gtm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.5.5" }, { "model": "big-ip gtm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.5.4" }, { "model": "big-ip gtm hf1", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.5.3" }, { "model": "big-ip gtm hf6", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.5.1" }, { "model": "big-ip gtm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.2.1" }, { "model": "big-ip edge gateway", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "14.0" }, { "model": "big-ip edge gateway", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "13.1" }, { "model": "big-ip edge gateway", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "13.0.1" }, { "model": "big-ip edge gateway", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "12.1.3" }, { "model": "big-ip edge gateway", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "12.1.2" }, { "model": "big-ip edge gateway", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "12.1" }, { "model": "big-ip edge gateway", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.6.3" }, { "model": "big-ip edge gateway", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.6.2" }, { "model": "big-ip edge gateway", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.6.1" }, { "model": "big-ip edge gateway", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.5.7" }, { "model": "big-ip edge gateway", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.5.6" }, { "model": "big-ip edge gateway", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.5.1" }, { "model": "big-ip edge gateway", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.2.1" }, { "model": "big-ip dns", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "14.0" }, { "model": "big-ip dns", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "13.1" }, { "model": "big-ip dns", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "13.0.1" }, { "model": "big-ip dns hf3", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "13.0" }, { "model": "big-ip dns hf2", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "13.0" }, { "model": "big-ip dns hf1", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "13.0" }, { "model": "big-ip dns", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "13.0" }, { "model": "big-ip dns", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "12.1.3" }, { "model": "big-ip dns hf2", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "12.1.2" }, { "model": "big-ip dns hf1", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "12.1.2" }, { "model": "big-ip dns", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "12.1.2" }, { "model": "big-ip dns", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "12.1.1" }, { "model": "big-ip dns", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.6.3" }, { "model": "big-ip dns", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.6.2" }, { "model": "big-ip dns", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.6.1" }, { "model": "big-ip dns", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.5.7" }, { "model": "big-ip dns", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.5.6" }, { "model": "big-ip dns", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.5.5" }, { "model": "big-ip dns hf1", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.5.4" }, { "model": "big-ip dns", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.5.4" }, { "model": "big-ip dns", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.5.3" }, { "model": "big-ip dns", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.5.2" }, { "model": "big-ip dns", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.5.1" }, { "model": "big-ip dns", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.2.1" }, { "model": "big-ip dns", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "12.1.0" }, { "model": "big-ip asm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "14.0" }, { "model": "big-ip asm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "13.1" }, { "model": "big-ip asm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "13.0.1" }, { "model": "big-ip asm hf3", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "13.0" }, { "model": "big-ip asm hf2", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "13.0" }, { "model": "big-ip asm hf1", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "13.0" }, { "model": "big-ip asm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "13.0" }, { "model": "big-ip asm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "12.1.3" }, { "model": "big-ip asm hf2", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "12.1.2" }, { "model": "big-ip asm hf1", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "12.1.2" }, { "model": "big-ip asm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "12.1.2" }, { "model": "big-ip asm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "12.1.1" }, { "model": "big-ip asm hf2", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "12.1" }, { "model": "big-ip asm hf1", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "12.1" }, { "model": "big-ip asm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.6.3" }, { "model": "big-ip asm hf1", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.6.2" }, { "model": "big-ip asm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.6.2" }, { "model": "big-ip asm hf2", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.6.1" }, { "model": "big-ip asm hf1", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.6.1" }, { "model": "big-ip asm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.6.1" }, { "model": "big-ip asm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.5.7" }, { "model": "big-ip asm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.5.6" }, { "model": "big-ip asm hf3", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.5.4" }, { "model": "big-ip asm hf2", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.5.4" }, { "model": "big-ip asm hf1", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.5.4" }, { "model": "big-ip asm hf2", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.5.3" }, { "model": "big-ip asm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.5.3" }, { "model": "big-ip asm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.5.2" }, { "model": "big-ip asm hf6", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.5.1" }, { "model": "big-ip asm hf11", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.5.1" }, { "model": "big-ip asm hf10", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.5.1" }, { "model": "big-ip asm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.5.1" }, { "model": "big-ip asm hf1", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "12.1.1" }, { "model": "big-ip asm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "12.1.0" }, { "model": "big-ip asm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.5.5" }, { "model": "big-ip asm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.5.4" }, { "model": "big-ip asm hf1", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.5.3" }, { "model": "big-ip asm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.2.1" }, { "model": "big-ip apm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "14.0" }, { "model": "big-ip apm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "13.1" }, { "model": "big-ip apm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "13.0.1" }, { "model": "big-ip apm hf3", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "13.0" }, { "model": "big-ip apm hf1", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "13.0" }, { "model": "big-ip apm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "13.0" }, { "model": "big-ip apm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "12.1.3" }, { "model": "big-ip apm hf2", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "12.1.2" }, { "model": "big-ip apm hf1", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "12.1.2" }, { "model": "big-ip apm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "12.1.2" }, { "model": "big-ip apm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "12.1.1" }, { "model": "big-ip apm hf2", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "12.1" }, { "model": "big-ip apm hf1", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "12.1" }, { "model": "big-ip apm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.6.3" }, { "model": "big-ip apm hf1", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.6.2" }, { "model": "big-ip apm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.6.2" }, { "model": "big-ip apm hf2", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.6.1" }, { "model": "big-ip apm hf1", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.6.1" }, { "model": "big-ip apm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.6.1" }, { "model": "big-ip apm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.5.7" }, { "model": "big-ip apm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.5.6" }, { "model": "big-ip apm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.5.5" }, { "model": "big-ip apm hf3", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.5.4" }, { "model": "big-ip apm hf2", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.5.4" }, { "model": "big-ip apm hf1", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.5.4" }, { "model": "big-ip apm hf2", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.5.3" }, { "model": "big-ip apm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.5.3" }, { "model": "big-ip apm hf1", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.5.2" }, { "model": "big-ip apm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.5.2" }, { "model": "big-ip apm hf11", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.5.1" }, { "model": "big-ip apm hf10", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.5.1" }, { "model": "big-ip apm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.5.1" }, { "model": "big-ip apm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "12.1.0" }, { "model": "big-ip apm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.5.4" }, { "model": "big-ip apm hf1", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.5.3" }, { "model": "big-ip apm hf6", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.5.1" }, { "model": "big-ip apm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.2.1" }, { "model": "big-ip analytics", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "14.0" }, { "model": "big-ip analytics", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "13.1" }, { "model": "big-ip analytics hf3", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "13.0" }, { "model": "big-ip analytics hf2", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "13.0" }, { "model": "big-ip analytics hf1", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "13.0" }, { "model": "big-ip analytics", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "13.0" }, { "model": "big-ip analytics", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "12.1.3" }, { "model": "big-ip analytics hf2", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "12.1.2" }, { "model": "big-ip analytics hf1", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "12.1.2" }, { "model": "big-ip analytics", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "12.1.2" }, { "model": "big-ip analytics", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "12.1.1" }, { "model": "big-ip analytics", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.6.3" }, { "model": "big-ip analytics hf1", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.6.2" }, { "model": "big-ip analytics", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.6.2" }, { "model": "big-ip analytics hf2", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.6.1" }, { "model": "big-ip analytics hf1", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.6.1" }, { "model": "big-ip analytics", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.6.1" }, { "model": "big-ip analytics", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.5.7" }, { "model": "big-ip analytics", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.5.6" }, { "model": "big-ip analytics hf3", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.5.4" }, { "model": "big-ip analytics hf2", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.5.4" }, { "model": "big-ip analytics hf1", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.5.4" }, { "model": "big-ip analytics hf2", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.5.3" }, { "model": "big-ip analytics", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.5.3" }, { "model": "big-ip analytics", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.5.2" }, { "model": "big-ip analytics hf8", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.5.1" }, { "model": "big-ip analytics", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.5.1" }, { "model": "big-ip analytics", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.2.1" }, { "model": "big-ip analytics", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "12.1.0" }, { "model": "big-ip analytics", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.5.5" }, { "model": "big-ip analytics", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.5.4" }, { "model": "big-ip analytics hf1", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.5.3" }, { "model": "big-ip analytics hf6", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.5.1" }, { "model": "big-ip afm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "14.0" }, { "model": "big-ip afm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "13.1" }, { "model": "big-ip afm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "13.0.1" }, { "model": "big-ip afm hf3", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "13.0" }, { "model": "big-ip afm hf2", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "13.0" }, { "model": "big-ip afm hf1", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "13.0" }, { "model": "big-ip afm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "13.0" }, { "model": "big-ip afm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "12.1.3" }, { "model": "big-ip afm hf2", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "12.1.2" }, { "model": "big-ip afm hf1", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "12.1.2" }, { "model": "big-ip afm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "12.1.2" }, { "model": "big-ip afm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "12.1.1" }, { "model": "big-ip afm hf2", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "12.1" }, { "model": "big-ip afm hf1", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "12.1" }, { "model": "big-ip afm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.6.3" }, { "model": "big-ip afm hf2", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.6.1" }, { "model": "big-ip afm hf1", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.6.1" }, { "model": "big-ip afm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.6.1" }, { "model": "big-ip afm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.5.7" }, { "model": "big-ip afm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.5.6" }, { "model": "big-ip afm hf3", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.5.4" }, { "model": "big-ip afm hf2", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.5.4" }, { "model": "big-ip afm hf1", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.5.4" }, { "model": "big-ip afm hf2", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.5.3" }, { "model": "big-ip afm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.5.3" }, { "model": "big-ip afm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.5.2" }, { "model": "big-ip afm hf11", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.5.1" }, { "model": "big-ip afm hf10", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.5.1" }, { "model": "big-ip afm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.5.1" }, { "model": "big-ip afm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.2.1" }, { "model": "big-ip afm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "12.1.0" }, { "model": "big-ip afm hf1", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.6.2" }, { "model": "big-ip afm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.6.2" }, { "model": "big-ip afm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.5.5" }, { "model": "big-ip afm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.5.4" }, { "model": "big-ip afm hf1", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.5.3" }, { "model": "big-ip afm hf6", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.5.1" }, { "model": "big-ip aam", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "14.0" }, { "model": "big-ip aam", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "13.1" }, { "model": "big-ip aam", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "13.0.1" }, { "model": "big-ip aam hf3", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "13.0" }, { "model": "big-ip aam hf2", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "13.0" }, { "model": "big-ip aam hf1", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "13.0" }, { "model": "big-ip aam", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "13.0" }, { "model": "big-ip aam", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "12.1.3" }, { "model": "big-ip aam hf2", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "12.1.2" }, { "model": "big-ip aam hf1", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "12.1.2" }, { "model": "big-ip aam", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "12.1.2" }, { "model": "big-ip aam", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "12.1.1" }, { "model": "big-ip aam hf2", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "12.1" }, { "model": "big-ip aam hf1", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "12.1" }, { "model": "big-ip aam", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.6.3" }, { "model": "big-ip aam hf1", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.6.2" }, { "model": "big-ip aam", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.6.2" }, { "model": "big-ip aam hf2", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.6.1" }, { "model": "big-ip aam hf1", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.6.1" }, { "model": "big-ip aam", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.6.1" }, { "model": "big-ip aam", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.5.7" }, { "model": "big-ip aam", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.5.6" }, { "model": "big-ip aam", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.5.5" }, { "model": "big-ip aam hf3", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.5.4" }, { "model": "big-ip aam hf2", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.5.4" }, { "model": "big-ip aam hf1", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.5.4" }, { "model": "big-ip aam hf2", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.5.3" }, { "model": "big-ip aam", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.5.3" }, { "model": "big-ip aam", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.5.2" }, { "model": "big-ip aam hf6", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.5.1" }, { "model": "big-ip aam hf11", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.5.1" }, { "model": "big-ip aam hf10", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.5.1" }, { "model": "big-ip aam", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.5.1" }, { "model": "big-ip aam", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.2.1" }, { "model": "big-ip aam", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "12.1.0" }, { "model": "big-ip aam", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.5.4" }, { "model": "big-ip aam hf1", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.5.3" }, { "model": "apr-util", "scope": "eq", "trust": 0.3, "vendor": "apache", "version": "1.6.2" }, { "model": "apr-util", "scope": "eq", "trust": 0.3, "vendor": "apache", "version": "1.6.1" }, { "model": "apr-util", "scope": "eq", "trust": 0.3, "vendor": "apache", "version": "1.6" }, { "model": "apr-util", "scope": "eq", "trust": 0.3, "vendor": "apache", "version": "1.3.10" }, { "model": "apr-util", "scope": "eq", "trust": 0.3, "vendor": "apache", "version": "1.3.9" }, { "model": "apr-util", "scope": "eq", "trust": 0.3, "vendor": "apache", "version": "1.3.8" }, { "model": "apr-util", "scope": "eq", "trust": 0.3, "vendor": "apache", "version": "1.3.7" }, { "model": "apr-util", "scope": "eq", "trust": 0.3, "vendor": "apache", "version": "1.3.6" }, { "model": "apr-util", "scope": "eq", "trust": 0.3, "vendor": "apache", "version": "1.3.5" }, { "model": "apr-util", "scope": "eq", "trust": 0.3, "vendor": "apache", "version": "1.3.4" }, { "model": "apr-util", "scope": "eq", "trust": 0.3, "vendor": "apache", "version": "1.3.3" }, { "model": "apr-util", "scope": "eq", "trust": 0.3, "vendor": "apache", "version": "1.3.2" }, { "model": "apr-util", "scope": "eq", "trust": 0.3, "vendor": "apache", "version": "1.2.13" }, { "model": "apr-util", "scope": "eq", "trust": 0.3, "vendor": "apache", "version": "1.2.12" }, { "model": "apr-util", "scope": "eq", "trust": 0.3, "vendor": "apache", "version": "1.2.10" }, { "model": "apr-util", "scope": "eq", "trust": 0.3, "vendor": "apache", "version": "1.2.9" }, { "model": "apr-util", "scope": "eq", "trust": 0.3, "vendor": "apache", "version": "1.2.7" }, { "model": "apr-util", "scope": "eq", "trust": 0.3, "vendor": "apache", "version": "0.9.18" }, { "model": "apr-util", "scope": "eq", "trust": 0.3, "vendor": "apache", "version": "0.9.17" }, { "model": "apr-util", "scope": "eq", "trust": 0.3, "vendor": "apache", "version": "0.9.16" }, { "model": "apr-util", "scope": "eq", "trust": 0.3, "vendor": "apache", "version": "0.9.15" }, { "model": "apr-util", "scope": "eq", "trust": 0.3, "vendor": "apache", "version": "0.9.14" }, { "model": "apr-util", "scope": "eq", "trust": 0.3, "vendor": "apache", "version": "0.9.13" }, { "model": "apr-util", "scope": "eq", "trust": 0.3, "vendor": "apache", "version": "0.9.12" }, { "model": "apr-util", "scope": "eq", "trust": 0.3, "vendor": "apache", "version": "0.9.11" }, { "model": "apr-util", "scope": "eq", "trust": 0.3, "vendor": "apache", "version": "0.9.10" }, { "model": "apr-util", "scope": "eq", "trust": 0.3, "vendor": "apache", "version": "0.9.9" }, { "model": "apr-util", "scope": "eq", "trust": 0.3, "vendor": "apache", "version": "0.9.8" }, { "model": "apr-util", "scope": "eq", "trust": 0.3, "vendor": "apache", "version": "0.9.7" }, { "model": "apr-util", "scope": "eq", "trust": 0.3, "vendor": "apache", "version": "0.9.6" }, { "model": "apr-util", "scope": "eq", "trust": 0.3, "vendor": "apache", "version": "0.9.4" }, { "model": "apr-util", "scope": "eq", "trust": 0.3, "vendor": "apache", "version": "1.4.4" }, { "model": "apr-util", "scope": "eq", "trust": 0.3, "vendor": "apache", "version": "1.4.3" }, { "model": "apr-util", "scope": "eq", "trust": 0.3, "vendor": "apache", "version": "1.3.1" }, { "model": "apr-util", "scope": "eq", "trust": 0.3, "vendor": "apache", "version": "1.3.0" }, { "model": "apr-util", "scope": "eq", "trust": 0.3, "vendor": "apache", "version": "1.2.6" }, { "model": "apr-util", "scope": "eq", "trust": 0.3, "vendor": "apache", "version": "1.2.2" }, { "model": "apr-util", "scope": "eq", "trust": 0.3, "vendor": "apache", "version": "1.2.1" }, { "model": "apr-util", "scope": "eq", "trust": 0.3, "vendor": "apache", "version": "1.1.2" }, { "model": "apr-util", "scope": "eq", "trust": 0.3, "vendor": "apache", "version": "1.1.1" }, { "model": "apr-util", "scope": "eq", "trust": 0.3, "vendor": "apache", "version": "1.1.0" }, { "model": "apr-util", "scope": "eq", "trust": 0.3, "vendor": "apache", "version": "1.0.1" }, { "model": "apr-util", "scope": "eq", "trust": 0.3, "vendor": "apache", "version": "0.9.3" }, { "model": "apr-util", "scope": "eq", "trust": 0.3, "vendor": "apache", "version": "0.9.2" }, { "model": "apr-util", "scope": "eq", "trust": 0.3, "vendor": "apache", "version": "0.9.1" }, { "model": "big-ip websafe", "scope": "ne", "trust": 0.3, "vendor": "f5", "version": "14.1" }, { "model": "big-ip websafe", "scope": "ne", "trust": 0.3, "vendor": "f5", "version": "14.0.0.3" }, { "model": "big-ip websafe", "scope": "ne", "trust": 0.3, "vendor": "f5", "version": "13.1.0.6" }, { "model": "big-ip websafe", "scope": "ne", "trust": 0.3, "vendor": "f5", "version": "12.1.3.6" }, { "model": "big-ip webaccelerator", "scope": "ne", "trust": 0.3, "vendor": "f5", "version": "14.1" }, { "model": "big-ip webaccelerator", "scope": "ne", "trust": 0.3, "vendor": "f5", "version": "14.0.0.3" }, { "model": "big-ip webaccelerator", "scope": "ne", "trust": 0.3, "vendor": "f5", "version": "13.1.0.6" }, { "model": "big-ip webaccelerator", "scope": "ne", "trust": 0.3, "vendor": "f5", "version": "12.1.3.6" }, { "model": "big-ip pem", "scope": "ne", "trust": 0.3, "vendor": "f5", "version": "14.1" }, { "model": "big-ip pem", "scope": "ne", "trust": 0.3, "vendor": "f5", "version": "14.0.0.3" }, { "model": "big-ip pem", "scope": "ne", "trust": 0.3, "vendor": "f5", "version": "13.1.0.6" }, { "model": "big-ip pem", "scope": "ne", "trust": 0.3, "vendor": "f5", "version": "12.1.3.6" }, { "model": "big-ip ltm", "scope": "ne", "trust": 0.3, "vendor": "f5", "version": "14.1" }, { "model": "big-ip ltm", "scope": "ne", "trust": 0.3, "vendor": "f5", "version": "14.0.0.3" }, { "model": "big-ip ltm", "scope": "ne", "trust": 0.3, "vendor": "f5", "version": "13.1.0.6" }, { "model": "big-ip ltm", "scope": "ne", "trust": 0.3, "vendor": "f5", "version": "12.1.3.6" }, { "model": "big-ip link controller", "scope": "ne", "trust": 0.3, "vendor": "f5", "version": "14.1" }, { "model": "big-ip link controller", "scope": "ne", "trust": 0.3, "vendor": "f5", "version": "14.0.0.3" }, { "model": "big-ip link controller", "scope": "ne", "trust": 0.3, "vendor": "f5", "version": "13.1.0.6" }, { "model": "big-ip link controller", "scope": "ne", "trust": 0.3, "vendor": "f5", "version": "12.1.3.6" }, { "model": "big-ip gtm", "scope": "ne", "trust": 0.3, "vendor": "f5", "version": "14.1" }, { "model": "big-ip gtm", "scope": "ne", "trust": 0.3, "vendor": "f5", "version": "14.0.0.3" }, { "model": "big-ip gtm", "scope": "ne", "trust": 0.3, "vendor": "f5", "version": "13.1.0.6" }, { "model": "big-ip gtm", "scope": "ne", "trust": 0.3, "vendor": "f5", "version": "12.1.3.6" }, { "model": "big-ip edge gateway", "scope": "ne", "trust": 0.3, "vendor": "f5", "version": "14.1" }, { "model": "big-ip edge gateway", "scope": "ne", "trust": 0.3, "vendor": "f5", "version": "13.1.0.6" }, { "model": "big-ip dns", "scope": "ne", "trust": 0.3, "vendor": "f5", "version": "14.1" }, { "model": "big-ip dns", "scope": "ne", "trust": 0.3, "vendor": "f5", "version": "14.0.0.3" }, { "model": "big-ip dns", "scope": "ne", "trust": 0.3, "vendor": "f5", "version": "13.1.0.6" }, { "model": "big-ip dns", "scope": "ne", "trust": 0.3, "vendor": "f5", "version": "12.1.3.6" }, { "model": "big-ip asm", "scope": "ne", "trust": 0.3, "vendor": "f5", "version": "14.1" }, { "model": "big-ip asm", "scope": "ne", "trust": 0.3, "vendor": "f5", "version": "14.0.0.3" }, { "model": "big-ip asm", "scope": "ne", "trust": 0.3, "vendor": "f5", "version": "13.1.0.6" }, { "model": "big-ip asm", "scope": "ne", "trust": 0.3, "vendor": "f5", "version": "12.1.3.6" }, { "model": "big-ip apm", "scope": "ne", "trust": 0.3, "vendor": "f5", "version": "14.1" }, { "model": "big-ip apm", "scope": "ne", "trust": 0.3, "vendor": "f5", "version": "14.0.0.3" }, { "model": "big-ip apm", "scope": "ne", "trust": 0.3, "vendor": "f5", "version": "13.1.0.6" }, { "model": "big-ip apm", "scope": "ne", "trust": 0.3, "vendor": "f5", "version": "12.1.3.6" }, { "model": "big-ip analytics", "scope": "ne", "trust": 0.3, "vendor": "f5", "version": "14.1" }, { "model": "big-ip analytics", "scope": "ne", "trust": 0.3, "vendor": "f5", "version": "14.0.0.3" }, { "model": "big-ip analytics", "scope": "ne", "trust": 0.3, "vendor": "f5", "version": "13.1.0.6" }, { "model": "big-ip analytics", "scope": "ne", "trust": 0.3, "vendor": "f5", "version": "12.1.3.6" }, { "model": "big-ip afm", "scope": "ne", "trust": 0.3, "vendor": "f5", "version": "14.1" }, { "model": "big-ip afm", "scope": "ne", "trust": 0.3, "vendor": "f5", "version": "14.0.0.3" }, { "model": "big-ip afm", "scope": "ne", "trust": 0.3, "vendor": "f5", "version": "13.1.0.6" }, { "model": "big-ip afm", "scope": "ne", "trust": 0.3, "vendor": "f5", "version": "12.1.3.6" }, { "model": "big-ip aam", "scope": "ne", "trust": 0.3, "vendor": "f5", "version": "14.1" }, { "model": "big-ip aam", "scope": "ne", "trust": 0.3, "vendor": "f5", "version": "14.0.0.3" }, { "model": "big-ip aam", "scope": "ne", "trust": 0.3, "vendor": "f5", "version": "13.1.0.6" }, { "model": "big-ip aam", "scope": "ne", "trust": 0.3, "vendor": "f5", "version": "12.1.3.6" }, { "model": "apr-util", "scope": "ne", "trust": 0.3, "vendor": "apache", "version": "1.6.3" } ], "sources": [ { "db": "BID", "id": "101560" }, { "db": "JVNDB", "id": "JVNDB-2017-009633" }, { "db": "CNNVD", "id": "CNNVD-201710-1140" }, { "db": "NVD", "id": "CVE-2017-12613" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:apache:portable_runtime:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "1.7.0", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_server_aus:7.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_server_tus:7.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_server_aus:6.6:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:redhat:software_collections:1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_eus:6.7:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_server_aus:6.5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_server_aus:6.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:redhat:jboss_enterprise_web_server:3.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_server_tus:7.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_eus:7.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:redhat:jboss_core_services:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_server_tus:6.6:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:redhat:jboss_core_services:1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2017-12613" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The vendor reported this issue.", "sources": [ { "db": "BID", "id": "101560" }, { "db": "CNNVD", "id": "CNNVD-201710-1140" } ], "trust": 0.9 }, "cve": "CVE-2017-12613", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 3.6, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 3.9, "impactScore": 4.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "LOW", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Local", "authentication": "None", "author": "NVD", "availabilityImpact": "Partial", "baseScore": 3.6, "confidentialityImpact": "Partial", "exploitabilityScore": null, "id": "CVE-2017-12613", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Low", "trust": 0.9, "userInteractionRequired": null, "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "LOCAL", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 7.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 1.8, "impactScore": 5.2, "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Local", "author": "NVD", "availabilityImpact": "High", "baseScore": 7.1, "baseSeverity": "High", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2017-12613", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "Low", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2017-12613", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-201710-1140", "trust": 0.6, "value": "HIGH" }, { "author": "VULMON", "id": "CVE-2017-12613", "trust": 0.1, "value": "LOW" } ] } ], "sources": [ { "db": "VULMON", "id": "CVE-2017-12613" }, { "db": "JVNDB", "id": "JVNDB-2017-009633" }, { "db": "CNNVD", "id": "CNNVD-201710-1140" }, { "db": "NVD", "id": "CVE-2017-12613" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "When apr_time_exp*() or apr_os_exp_time*() functions are invoked with an invalid month field value in Apache Portable Runtime APR 1.6.2 and prior, out of bounds memory may be accessed in converting this value to an apr_time_exp_t value, potentially revealing the contents of a different static heap value or resulting in program termination, and may represent an information disclosure or denial of service vulnerability to applications which call these APR functions with unvalidated external input. Apache Portable Runtime Contains a buffer error vulnerability.Information is obtained and service operation is interrupted (DoS) There is a possibility of being put into a state. Apache Portable Runtime Utility is prone to multiple information-disclosure vulnerabilities. \nAn attacker can exploit these issues to obtain sensitive information that may aid in further attacks. Failed exploit attempts will result in denial-of-service conditions. \nApache Portable Runtime Utility (APR-util) 1.6.2 and prior versions are vulnerable. -----BEGIN PGP SIGNED MESSAGE-----\nHash: SHA1\n\n=====================================================================\n Red Hat Security Advisory\n\nSynopsis: Important: apr security update\nAdvisory ID: RHSA-2018:1253-01\nProduct: Red Hat Enterprise Linux\nAdvisory URL: https://access.redhat.com/errata/RHSA-2018:1253\nIssue date: 2018-04-26\nCVE Names: CVE-2017-12613 \n=====================================================================\n\n1. Summary:\n\nAn update for apr is now available for Red Hat Enterprise Linux 6.4\nAdvanced Update Support, Red Hat Enterprise Linux 6.5 Advanced Update\nSupport, Red Hat Enterprise Linux 6.6 Advanced Update Support, Red Hat\nEnterprise Linux 6.6 Telco Extended Update Support, Red Hat Enterprise\nLinux 6.7 Extended Update Support, Red Hat Enterprise Linux 7.2 Advanced\nUpdate Support, Red Hat Enterprise Linux 7.2 Telco Extended Update Support,\nRed Hat Enterprise Linux 7.2 Update Services for SAP Solutions, and Red Hat\nEnterprise Linux 7.3 Extended Update Support. \n\nRed Hat Product Security has rated this update as having a security impact\nof Important. A Common Vulnerability Scoring System (CVSS) base score,\nwhich gives a detailed severity rating, is available for each vulnerability\nfrom the CVE link(s) in the References section. \n\n2. Relevant releases/architectures:\n\nRed Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3) - x86_64\nRed Hat Enterprise Linux HPC Node EUS (v. 6.7) - x86_64\nRed Hat Enterprise Linux HPC Node Optional EUS (v. 6.7) - x86_64\nRed Hat Enterprise Linux Server AUS (v. 6.4) - x86_64\nRed Hat Enterprise Linux Server AUS (v. 6.5) - x86_64\nRed Hat Enterprise Linux Server AUS (v. 6.6) - x86_64\nRed Hat Enterprise Linux Server AUS (v. 7.2) - x86_64\nRed Hat Enterprise Linux Server E4S (v. 7.2) - ppc64le, x86_64\nRed Hat Enterprise Linux Server EUS (v. 6.7) - i386, ppc64, s390x, x86_64\nRed Hat Enterprise Linux Server EUS (v. 7.3) - ppc64, ppc64le, s390x, x86_64\nRed Hat Enterprise Linux Server TUS (v. 6.6) - x86_64\nRed Hat Enterprise Linux Server TUS (v. 7.2) - x86_64\n\n3. Description:\n\nThe Apache Portable Runtime (APR) is a portability library used by the\nApache HTTP Server and other projects. It provides a free library of C data\nstructures and routines. \n\nSecurity Fix(es):\n\n* apr: Out-of-bounds array deref in apr_time_exp*() functions\n(CVE-2017-12613)\n\nFor more details about the security issue(s), including the impact, a CVSS\nscore, and other related information, refer to the CVE page(s) listed in\nthe References section. \n\n4. Solution:\n\nFor details on how to apply this update, which includes the changes\ndescribed in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nApplications using the APR libraries, such as httpd, must be restarted for\nthis update to take effect. \n\n5. Bugs fixed (https://bugzilla.redhat.com/):\n\n1506523 - CVE-2017-12613 apr: Out-of-bounds array deref in apr_time_exp*() functions\n\n6. Package List:\n\nRed Hat Enterprise Linux HPC Node EUS (v. 6.7):\n\nSource:\napr-1.3.9-5.el6_7.1.src.rpm\n\nx86_64:\napr-1.3.9-5.el6_7.1.i686.rpm\napr-1.3.9-5.el6_7.1.x86_64.rpm\napr-debuginfo-1.3.9-5.el6_7.1.i686.rpm\napr-debuginfo-1.3.9-5.el6_7.1.x86_64.rpm\n\nRed Hat Enterprise Linux HPC Node Optional EUS (v. 6.7):\n\nx86_64:\napr-debuginfo-1.3.9-5.el6_7.1.i686.rpm\napr-debuginfo-1.3.9-5.el6_7.1.x86_64.rpm\napr-devel-1.3.9-5.el6_7.1.i686.rpm\napr-devel-1.3.9-5.el6_7.1.x86_64.rpm\n\nRed Hat Enterprise Linux Server AUS (v. 6.4):\n\nSource:\napr-1.3.9-5.el6_4.1.src.rpm\n\nx86_64:\napr-1.3.9-5.el6_4.1.i686.rpm\napr-1.3.9-5.el6_4.1.x86_64.rpm\napr-debuginfo-1.3.9-5.el6_4.1.i686.rpm\napr-debuginfo-1.3.9-5.el6_4.1.x86_64.rpm\napr-devel-1.3.9-5.el6_4.1.i686.rpm\napr-devel-1.3.9-5.el6_4.1.x86_64.rpm\n\nRed Hat Enterprise Linux Server AUS (v. 6.5):\n\nSource:\napr-1.3.9-5.el6_5.1.src.rpm\n\nx86_64:\napr-1.3.9-5.el6_5.1.i686.rpm\napr-1.3.9-5.el6_5.1.x86_64.rpm\napr-debuginfo-1.3.9-5.el6_5.1.i686.rpm\napr-debuginfo-1.3.9-5.el6_5.1.x86_64.rpm\napr-devel-1.3.9-5.el6_5.1.i686.rpm\napr-devel-1.3.9-5.el6_5.1.x86_64.rpm\n\nRed Hat Enterprise Linux Server AUS (v. 6.6):\n\nSource:\napr-1.3.9-5.el6_6.1.src.rpm\n\nx86_64:\napr-1.3.9-5.el6_6.1.i686.rpm\napr-1.3.9-5.el6_6.1.x86_64.rpm\napr-debuginfo-1.3.9-5.el6_6.1.i686.rpm\napr-debuginfo-1.3.9-5.el6_6.1.x86_64.rpm\napr-devel-1.3.9-5.el6_6.1.i686.rpm\napr-devel-1.3.9-5.el6_6.1.x86_64.rpm\n\nRed Hat Enterprise Linux Server TUS (v. 6.6):\n\nSource:\napr-1.3.9-5.el6_6.1.src.rpm\n\nx86_64:\napr-1.3.9-5.el6_6.1.i686.rpm\napr-1.3.9-5.el6_6.1.x86_64.rpm\napr-debuginfo-1.3.9-5.el6_6.1.i686.rpm\napr-debuginfo-1.3.9-5.el6_6.1.x86_64.rpm\napr-devel-1.3.9-5.el6_6.1.i686.rpm\napr-devel-1.3.9-5.el6_6.1.x86_64.rpm\n\nRed Hat Enterprise Linux Server EUS (v. 6.7):\n\nSource:\napr-1.3.9-5.el6_7.1.src.rpm\n\ni386:\napr-1.3.9-5.el6_7.1.i686.rpm\napr-debuginfo-1.3.9-5.el6_7.1.i686.rpm\napr-devel-1.3.9-5.el6_7.1.i686.rpm\n\nppc64:\napr-1.3.9-5.el6_7.1.ppc.rpm\napr-1.3.9-5.el6_7.1.ppc64.rpm\napr-debuginfo-1.3.9-5.el6_7.1.ppc.rpm\napr-debuginfo-1.3.9-5.el6_7.1.ppc64.rpm\napr-devel-1.3.9-5.el6_7.1.ppc.rpm\napr-devel-1.3.9-5.el6_7.1.ppc64.rpm\n\ns390x:\napr-1.3.9-5.el6_7.1.s390.rpm\napr-1.3.9-5.el6_7.1.s390x.rpm\napr-debuginfo-1.3.9-5.el6_7.1.s390.rpm\napr-debuginfo-1.3.9-5.el6_7.1.s390x.rpm\napr-devel-1.3.9-5.el6_7.1.s390.rpm\napr-devel-1.3.9-5.el6_7.1.s390x.rpm\n\nx86_64:\napr-1.3.9-5.el6_7.1.i686.rpm\napr-1.3.9-5.el6_7.1.x86_64.rpm\napr-debuginfo-1.3.9-5.el6_7.1.i686.rpm\napr-debuginfo-1.3.9-5.el6_7.1.x86_64.rpm\napr-devel-1.3.9-5.el6_7.1.i686.rpm\napr-devel-1.3.9-5.el6_7.1.x86_64.rpm\n\nRed Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3):\n\nSource:\napr-1.4.8-3.el7_3.1.src.rpm\n\nx86_64:\napr-1.4.8-3.el7_3.1.i686.rpm\napr-1.4.8-3.el7_3.1.x86_64.rpm\napr-debuginfo-1.4.8-3.el7_3.1.i686.rpm\napr-debuginfo-1.4.8-3.el7_3.1.x86_64.rpm\napr-devel-1.4.8-3.el7_3.1.i686.rpm\napr-devel-1.4.8-3.el7_3.1.x86_64.rpm\n\nRed Hat Enterprise Linux Server AUS (v. 7.2):\n\nSource:\napr-1.4.8-3.el7_2.1.src.rpm\n\nx86_64:\napr-1.4.8-3.el7_2.1.i686.rpm\napr-1.4.8-3.el7_2.1.x86_64.rpm\napr-debuginfo-1.4.8-3.el7_2.1.i686.rpm\napr-debuginfo-1.4.8-3.el7_2.1.x86_64.rpm\napr-devel-1.4.8-3.el7_2.1.i686.rpm\napr-devel-1.4.8-3.el7_2.1.x86_64.rpm\n\nRed Hat Enterprise Linux Server E4S (v. 7.2):\n\nSource:\napr-1.4.8-3.el7_2.1.src.rpm\n\nppc64le:\napr-1.4.8-3.el7_2.1.ppc64le.rpm\napr-debuginfo-1.4.8-3.el7_2.1.ppc64le.rpm\napr-devel-1.4.8-3.el7_2.1.ppc64le.rpm\n\nx86_64:\napr-1.4.8-3.el7_2.1.i686.rpm\napr-1.4.8-3.el7_2.1.x86_64.rpm\napr-debuginfo-1.4.8-3.el7_2.1.i686.rpm\napr-debuginfo-1.4.8-3.el7_2.1.x86_64.rpm\napr-devel-1.4.8-3.el7_2.1.i686.rpm\napr-devel-1.4.8-3.el7_2.1.x86_64.rpm\n\nRed Hat Enterprise Linux Server TUS (v. 7.2):\n\nSource:\napr-1.4.8-3.el7_2.1.src.rpm\n\nx86_64:\napr-1.4.8-3.el7_2.1.i686.rpm\napr-1.4.8-3.el7_2.1.x86_64.rpm\napr-debuginfo-1.4.8-3.el7_2.1.i686.rpm\napr-debuginfo-1.4.8-3.el7_2.1.x86_64.rpm\napr-devel-1.4.8-3.el7_2.1.i686.rpm\napr-devel-1.4.8-3.el7_2.1.x86_64.rpm\n\nRed Hat Enterprise Linux Server EUS (v. 7.3):\n\nSource:\napr-1.4.8-3.el7_3.1.src.rpm\n\nppc64:\napr-1.4.8-3.el7_3.1.ppc.rpm\napr-1.4.8-3.el7_3.1.ppc64.rpm\napr-debuginfo-1.4.8-3.el7_3.1.ppc.rpm\napr-debuginfo-1.4.8-3.el7_3.1.ppc64.rpm\napr-devel-1.4.8-3.el7_3.1.ppc.rpm\napr-devel-1.4.8-3.el7_3.1.ppc64.rpm\n\nppc64le:\napr-1.4.8-3.el7_3.1.ppc64le.rpm\napr-debuginfo-1.4.8-3.el7_3.1.ppc64le.rpm\napr-devel-1.4.8-3.el7_3.1.ppc64le.rpm\n\ns390x:\napr-1.4.8-3.el7_3.1.s390.rpm\napr-1.4.8-3.el7_3.1.s390x.rpm\napr-debuginfo-1.4.8-3.el7_3.1.s390.rpm\napr-debuginfo-1.4.8-3.el7_3.1.s390x.rpm\napr-devel-1.4.8-3.el7_3.1.s390.rpm\napr-devel-1.4.8-3.el7_3.1.s390x.rpm\n\nx86_64:\napr-1.4.8-3.el7_3.1.i686.rpm\napr-1.4.8-3.el7_3.1.x86_64.rpm\napr-debuginfo-1.4.8-3.el7_3.1.i686.rpm\napr-debuginfo-1.4.8-3.el7_3.1.x86_64.rpm\napr-devel-1.4.8-3.el7_3.1.i686.rpm\napr-devel-1.4.8-3.el7_3.1.x86_64.rpm\n\nThese packages are GPG signed by Red Hat for security. Our key and\ndetails on how to verify the signature are available from\nhttps://access.redhat.com/security/team/key/\n\n7. References:\n\nhttps://access.redhat.com/security/cve/CVE-2017-12613\nhttps://access.redhat.com/security/updates/classification/#important\n\n8. Contact:\n\nThe Red Hat security contact is \u003csecalert@redhat.com\u003e. More contact\ndetails at https://access.redhat.com/security/team/contact/\n\nCopyright 2018 Red Hat, Inc. \n-----BEGIN PGP SIGNATURE-----\nVersion: GnuPG v1\n\niD8DBQFa4j0lXlSAg2UNWIIRAq05AJ4pwwTLE6OnsWgsL1xxge5Zz+C28ACdHRHQ\nw0VT8MLHcQqKdXFiVKYYrrE=\n=mjXk\n-----END PGP SIGNATURE-----\n\n--\nRHSA-announce mailing list\nRHSA-announce@redhat.com\nhttps://www.redhat.com/mailman/listinfo/rhsa-announce\n. -----BEGIN PGP SIGNED MESSAGE-----\nHash: SHA256\n\nAPPLE-SA-2018-10-30-9 Additional information for\nAPPLE-SA-2018-9-24-1 macOS Mojave 10.14\n\nmacOS Mojave 10.14 addresses the following:\n\nBluetooth\nAvailable for: iMac (21.5-inch, Late 2012), iMac (27-inch, Late 2012)\n, iMac (21.5-inch, Late 2013), iMac (21.5-inch, Mid 2014), iMac\n(Retina 5K, 27-inch, Late 2014), iMac (21.5-inch, Late 2015),\nMac mini (Mid 2011), Mac mini Server (Mid 2011), Mac mini (Late 2012)\n, Mac mini Server (Late 2012), Mac mini (Late 2014), Mac Pro\n(Late 2013), MacBook Air (11-inch, Mid 2011), MacBook Air\n(13-inch, Mid 2011), MacBook Air (11-inch, Mid 2012), MacBook Air\n(13-inch, Mid 2012), MacBook Air (11-inch, Mid 2013), MacBook Air\n(13-inch, Mid 2013), MacBook Air (11-inch, Early 2015), MacBook Air\n(13-inch, Early 2015), MacBook Pro (13-inch, Mid 2012), MacBook Pro\n(15-inch, Mid 2012), MacBook Pro (Retina, 13-inch, Early 2013),\nMacBook Pro (Retina, 15-inch, Early 2013), MacBook Pro (Retina,\n13-inch, Late 2013), and MacBook Pro (Retina, 15-inch, Late 2013)\nImpact: An attacker in a privileged network position may be able to\nintercept Bluetooth traffic\nDescription: An input validation issue existed in Bluetooth. This\nissue was addressed with improved input validation. \nCVE-2018-5383: Lior Neumann and Eli Biham\n\nThe updates below are available for these Mac models:\nMacBook (Early 2015 and later), MacBook Air (Mid 2012 and later),\nMacBook Pro (Mid 2012 and later), Mac mini (Late 2012 and later),\niMac (Late 2012 and later), iMac Pro (all models), Mac Pro\n(Late 2013, Mid 2010, and Mid 2012 models with recommended\nMetal-capable graphics processor, including MSI Gaming Radeon RX 560\nand Sapphire Radeon PULSE RX 580)\n\nafpserver\nImpact: A remote attacker may be able to attack AFP servers through\nHTTP clients\nDescription: An input validation issue was addressed with improved\ninput validation. \nCVE-2018-4295: Jianjun Chen (@whucjj) from Tsinghua University and UC\nBerkeley\nEntry added October 30, 2018\n\nApp Store\nImpact: A malicious application may be able to determine the Apple ID\nof the owner of the computer\nDescription: A permissions issue existed in the handling of the Apple\nID. This issue was addressed with improved access controls. \nCVE-2018-4324: Sergii Kryvoblotskyi of MacPaw Inc. \n\nAppleGraphicsControl\nImpact: An application may be able to read restricted memory\nDescription: A validation issue was addressed with improved input\nsanitization. \nCVE-2018-4417: Lee of the Information Security Lab Yonsei University\nworking with Trend Micro\u0027s Zero Day Initiative\nEntry added October 30, 2018\n\nApplication Firewall\nImpact: A sandboxed process may be able to circumvent sandbox\nrestrictions\nDescription: A configuration issue was addressed with additional\nrestrictions. \nCVE-2018-4353: Abhinav Bansal of LinkedIn Inc. \n\nAPR\nImpact: Multiple buffer overflow issues existed in Perl\nDescription: Multiple issues in Perl were addressed with improved\nmemory handling. \nCVE-2017-12613: Craig Young of Tripwire VERT\nCVE-2017-12618: Craig Young of Tripwire VERT\nEntry added October 30, 2018\n\nATS\nImpact: A malicious application may be able to elevate privileges\nDescription: A memory corruption issue was addressed with improved\ninput validation. \nCVE-2018-4411: lilang wu moony Li of Trend Micro working with Trend\nMicro\u0027s Zero Day Initiative\nEntry added October 30, 2018\n\nATS\nImpact: An application may be able to read restricted memory\nDescription: An out-of-bounds read was addressed with improved bounds\nchecking. \nCVE-2018-4308: Mohamed Ghannam (@_simo36)\nEntry added October 30, 2018\n\nAuto Unlock\nImpact: A malicious application may be able to access local users\nAppleIDs\nDescription: A validation issue existed in the entitlement\nverification. This issue was addressed with improved validation of\nthe process entitlement. \nCVE-2018-4321: Min (Spark) Zheng, Xiaolong Bai of Alibaba Inc. \n\nCFNetwork\nImpact: An application may be able to execute arbitrary code with\nsystem privileges\nDescription: A memory corruption issue was addressed with improved\nmemory handling. \nCVE-2018-4126: Bruno Keith (@bkth_) working with Trend Micro\u0027s Zero\nDay Initiative\nEntry added October 30, 2018\n\nCoreFoundation\nImpact: A malicious application may be able to elevate privileges\nDescription: A memory corruption issue was addressed with improved\ninput validation. \nCVE-2018-4412: The UK\u0027s National Cyber Security Centre (NCSC)\nEntry added October 30, 2018\n\nCoreFoundation\nImpact: An application may be able to gain elevated privileges\nDescription: A memory corruption issue was addressed with improved\ninput validation. \nCVE-2018-4414: The UK\u0027s National Cyber Security Centre (NCSC)\nEntry added October 30, 2018\n\nCoreText\nImpact: Processing a maliciously crafted text file may lead to\narbitrary code execution\nDescription: A use after free issue was addressed with improved\nmemory management. \nCVE-2018-4347: an anonymous researcher\nEntry added October 30, 2018\n\nCrash Reporter\nImpact: An application may be able to read restricted memory\nDescription: A validation issue was addressed with improved input\nsanitization. \nCVE-2018-4333: Brandon Azad\n\nCUPS\nImpact: In certain configurations, a remote attacker may be able to\nreplace the message content from the print server with arbitrary\ncontent\nDescription: An injection issue was addressed with improved\nvalidation. \nCVE-2018-4153: Michael Hanselmann of hansmi.ch\nEntry added October 30, 2018\n\nCUPS\nImpact: An attacker in a privileged position may be able to perform a\ndenial of service attack\nDescription: A denial of service issue was addressed with improved\nvalidation. \nCVE-2018-4406: Michael Hanselmann of hansmi.ch\nEntry added October 30, 2018\n\nDictionary\nImpact: Parsing a maliciously crafted dictionary file may lead to\ndisclosure of user information\nDescription: A validation issue existed which allowed local file\naccess. This was addressed with input sanitization. \nCVE-2018-4346: Wojciech ReguAa (@_r3ggi) of SecuRing\nEntry added October 30, 2018\n\nGrand Central Dispatch\nImpact: An application may be able to execute arbitrary code with\nsystem privileges\nDescription: A memory corruption issue was addressed with improved\nmemory handling. \nCVE-2018-4426: Brandon Azad\nEntry added October 30, 2018\n\nHeimdal\nImpact: An application may be able to execute arbitrary code with\nsystem privileges\nDescription: A memory corruption issue was addressed with improved\nmemory handling. \nCVE-2018-4331: Brandon Azad\nCVE-2018-4332: Brandon Azad\nCVE-2018-4343: Brandon Azad\nEntry added October 30, 2018\n\nHypervisor\nImpact: Systems with microprocessors utilizing speculative execution\nand address translations may allow unauthorized disclosure of\ninformation residing in the L1 data cache to an attacker with local\nuser access with guest OS privilege via a terminal page fault and a\nside-channel analysis\nDescription: An information disclosure issue was addressed by\nflushing the L1 data cache at the virtual machine entry. \nCVE-2018-3646: Baris Kasikci, Daniel Genkin, Ofir Weisse, and Thomas\nF. Wenisch of University of Michigan, Mark Silberstein and Marina\nMinkin of Technion, Raoul Strackx, Jo Van Bulck, and Frank Piessens\nof KU Leuven, Rodrigo Branco, Henrique Kawakami, Ke Sun, and Kekai Hu\nof Intel Corporation, Yuval Yarom of The University of Adelaide\nEntry added October 30, 2018\n\niBooks\nImpact: Parsing a maliciously crafted iBooks file may lead to\ndisclosure of user information\nDescription: A configuration issue was addressed with additional\nrestrictions. \nCVE-2018-4355: evi1m0 of bilibili security team\nEntry added October 30, 2018\n\nIntel Graphics Driver\nImpact: An application may be able to read restricted memory\nDescription: A validation issue was addressed with improved input\nsanitization. \nCVE-2018-4396: Yu Wang of Didi Research America\nCVE-2018-4418: Yu Wang of Didi Research America\nEntry added October 30, 2018\n\nIntel Graphics Driver\nImpact: An application may be able to read restricted memory\nDescription: A memory initialization issue was addressed with\nimproved memory handling. \nCVE-2018-4351: Appology Team @ Theori working with Trend Micro\u0027s Zero\nDay Initiative\nEntry added October 30, 2018\n\nIntel Graphics Driver\nImpact: An application may be able to execute arbitrary code with\nsystem privileges\nDescription: A memory corruption issue was addressed with improved\ninput validation. \nCVE-2018-4350: Yu Wang of Didi Research America\nEntry added October 30, 2018\n\nIntel Graphics Driver\nImpact: An application may be able to execute arbitrary code with\nsystem privileges\nDescription: A memory corruption issue was addressed with improved\nmemory handling. \nCVE-2018-4334: Ian Beer of Google Project Zero\nEntry added October 30, 2018\n\nIOHIDFamily\nImpact: A malicious application may be able to execute arbitrary code\nwith kernel privileges\nDescription: A memory corruption issue was addressed with improved\ninput validation\nCVE-2018-4408: Ian Beer of Google Project Zero\nEntry added October 30, 2018\n\nIOKit\nImpact: A malicious application may be able to break out of its\nsandbox\nDescription: A memory corruption issue was addressed with improved\nmemory handling. \nCVE-2018-4341: Ian Beer of Google Project Zero\nCVE-2018-4354: Ian Beer of Google Project Zero\nEntry added October 30, 2018\n\nIOKit\nImpact: An application may be able to execute arbitrary code with\nkernel privileges\nDescription: A memory corruption issue was addressed with improved\nstate management. \nCVE-2018-4383: Apple\nEntry added October 30, 2018\n\nIOUserEthernet\nImpact: An application may be able to execute arbitrary code with\nkernel privileges\nDescription: A memory corruption issue was addressed with improved\nmemory handling. \nCVE-2018-4401: Apple\nEntry added October 30, 2018\n\nKernel\nImpact: A malicious application may be able to leak sensitive user\ninformation\nDescription: An access issue existed with privileged API calls. This\nissue was addressed with additional restrictions. \nCVE-2018-4399: Fabiano Anemone (@anoane)\nEntry added October 30, 2018\n\nKernel\nImpact: An attacker in a privileged network position may be able to\nexecute arbitrary code\nDescription: A memory corruption issue was addressed with improved\nvalidation. \nCVE-2018-4407: Kevin Backhouse of Semmle Ltd. \nEntry added October 30, 2018\n\nKernel\nImpact: An application may be able to execute arbitrary code with\nkernel privileges\nDescription: A memory corruption issue was addressed with improved\nmemory handling. \nCVE-2018-4336: Brandon Azad\nCVE-2018-4337: Ian Beer of Google Project Zero\nCVE-2018-4340: Mohamed Ghannam (@_simo36)\nCVE-2018-4344: The UK\u0027s National Cyber Security Centre (NCSC)\nCVE-2018-4425: cc working with Trend Micro\u0027s Zero Day Initiative,\nJuwei Lin (@panicaII) of Trend Micro working with Trend Micro\u0027s Zero\nDay Initiative\nEntry added October 30, 2018\n\nLibreSSL\nImpact: Multiple issues in libressl were addressed in this update\nDescription: Multiple issues were addressed by updating to libressl\nversion 2.6.4. \nCVE-2015-3194\nCVE-2015-5333\nCVE-2015-5334\nCVE-2016-702\nEntry added October 30, 2018\n\nLogin Window\nImpact: A local user may be able to cause a denial of service\nDescription: A validation issue was addressed with improved logic. \nCVE-2018-4348: Ken Gannon of MWR InfoSecurity and Christian Demko of\nMWR InfoSecurity\nEntry added October 30, 2018\n\nmDNSOffloadUserClient\nImpact: An application may be able to execute arbitrary code with\nkernel privileges\nDescription: A memory corruption issue was addressed with improved\nmemory handling. \nCVE-2018-4326: an anonymous researcher working with Trend Micro\u0027s\nZero Day Initiative, Zhuo Liang of Qihoo 360 Nirvan Team\nEntry added October 30, 2018\n\nMediaRemote\nImpact: A sandboxed process may be able to circumvent sandbox\nrestrictions\nDescription: An access issue was addressed with additional sandbox\nrestrictions. \nCVE-2018-4310: CodeColorist of Ant-Financial LightYear Labs\nEntry added October 30, 2018\n\nMicrocode\nImpact: Systems with microprocessors utilizing speculative execution\nand speculative execution of memory reads before the addresses of all\nprior memory writes are known may allow unauthorized disclosure of\ninformation to an attacker with local user access via a side-channel\nanalysis\nDescription: An information disclosure issue was addressed with a\nmicrocode update. This ensures that older data read from\nrecently-written-to addresses cannot be read via a speculative\nside-channel. \nCVE-2018-3639: Jann Horn (@tehjh) of Google Project Zero (GPZ), Ken\nJohnson of the Microsoft Security Response Center (MSRC)\nEntry added October 30, 2018\n\nSecurity\nImpact: A local user may be able to cause a denial of service\nDescription: This issue was addressed with improved checks. \nCVE-2018-4395: Patrick Wardle of Digita Security\nEntry added October 30, 2018\n\nSecurity\nImpact: An attacker may be able to exploit weaknesses in the RC4\ncryptographic algorithm\nDescription: This issue was addressed by removing RC4. \nCVE-2016-1777: Pepi Zawodsky\n\nSpotlight\nImpact: An application may be able to execute arbitrary code with\nsystem privileges\nDescription: A memory corruption issue was addressed with improved\nmemory handling. \nCVE-2018-4393: Lufeng Li\nEntry added October 30, 2018\n\nSymptom Framework\nImpact: An application may be able to read restricted memory\nDescription: An out-of-bounds read was addressed with improved bounds\nchecking. \nCVE-2018-4203: Bruno Keith (@bkth_) working with Trend Micro\u0027s Zero\nDay Initiative\nEntry added October 30, 2018\n\nText\nImpact: Processing a maliciously crafted text file may lead to a\ndenial of service\nDescription: A denial of service issue was addressed with improved\nvalidation. \nCVE-2018-4304: jianan.huang (@Sevck)\nEntry added October 30, 2018\n\nWi-Fi\nImpact: An application may be able to read restricted memory\nDescription: A validation issue was addressed with improved input\nsanitization. \nCVE-2018-4338: Lee @ SECLAB, Yonsei University working with Trend\nMicro\u0027s Zero Day Initiative\nEntry added October 30, 2018\n\nAdditional recognition\n\nAccessibility Framework\nWe would like to acknowledge Ryan Govostes for their assistance. \n\nCore Data\nWe would like to acknowledge Andreas Kurtz (@aykay) of NESO Security\nLabs GmbH for their assistance. \n\nCoreDAV\nWe would like to acknowledge an anonymous researcher for their\nassistance. \n\nCoreGraphics\nWe would like to acknowledge Nitin Arya of Roblox Corporation for\ntheir assistance. \n\nCoreSymbolication\nWe would like to acknowledge Brandon Azad for their assistance. \n\nIOUSBHostFamily\nWe would like to acknowledge an anonymous researcher for their\nassistance. \n\nKernel\nWe would like to acknowledge Brandon Azad for their assistance. \n\nMail\nWe would like to acknowledge Alessandro Avagliano of Rocket Internet\nSE, John Whitehead of The New York Times, Kelvin Delbarre of Omicron\nSoftware Systems, and Zbyszek A\u003e\u003eA3Akiewski for their assistance. \n\nQuick Look\nWe would like to acknowledge Wojciech ReguAa (@_r3ggi) of SecuRing\nand Patrick Wardle of Digita Security and lokihardt of Google Project\nZero for their assistance. \n\nSecurity\nWe would like to acknowledge Christoph Sinai, Daniel Dudek\n(@dannysapples) of The Irish Times and Filip KlubiAka (@lemoncloak)\nof ADAPT Centre, Dublin Institute of Technology, Istvan Csanady of\nShapr3D, Omar Barkawi of ITG Software, Inc., Phil Caleno, Wilson\nDing, and an anonymous researcher for their assistance. \n\nSQLite\nWe would like to acknowledge Andreas Kurtz (@aykay) of NESO Security\nLabs GmbH for their assistance. \n\nTerminal\nWe would like to acknowledge an anonymous researcher for their\nassistance. \n\nWindowServer\nWe would like to acknowledge Patrick Wardle of Digita Security for\ntheir assistance. \n\nInstallation note:\n\nmacOS Mojave 10.14 may be obtained from the Mac App Store or\nApple\u0027s Software Downloads web site:\nhttps://support.apple.com/downloads/\n\nInformation will also be posted to the Apple Security Updates\nweb site: https://support.apple.com/kb/HT201222\n\nThis message is signed with Apple\u0027s Product Security PGP key,\nand details are available at:\nhttps://www.apple.com/support/security/pgp/\n-----BEGIN PGP SIGNATURE-----\n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\n1wZZGLtg3VubrZOsnUZzumD+0nI8c6QAnQK3P2PSZ0k=\n=i9YR\n-----END PGP SIGNATURE-----\n. Solution:\n\nBefore applying the update, back up your existing Red Hat JBoss Web Server\ninstallation (including all applications and configuration files). Bugs fixed (https://bugzilla.redhat.com/):\n\n1493220 - CVE-2017-12615 tomcat: Remote Code Execution via JSP Upload\n1493222 - CVE-2017-12616 tomcat: Information Disclosure when using VirtualDirContext\n1494283 - CVE-2017-12617 tomcat: Remote Code Execution bypass for CVE-2017-12615\n1506523 - CVE-2017-12613 apr: Out-of-bounds array deref in apr_time_exp*() functions\n1540824 - CVE-2017-15698 tomcat-native: Mishandling of client certificates can allow for OCSP check bypass\n1548282 - CVE-2018-1305 tomcat: Late application of security constraints can lead to resource exposure for unauthorised users\n1548289 - CVE-2018-1304 tomcat: Incorrect handling of empty string URL in security constraints can lead to unintended exposure of resources\n\n6. \n\nThe References section of this erratum contains a download link (you must\nlog in to download the update). Summary:\n\nAn update is now available for JBoss Core Services on RHEL 7. This software, such as Apache HTTP Server, is\ncommon to multiple JBoss middleware products, and is packaged under Red Hat\nJBoss Core Services to allow for faster distribution of updates, and for a\nmore consistent update experience. \n\nThis release of Red Hat JBoss Core Services Apache HTTP Server 2.4.23\nService Pack 3 serves as an update to Red Hat JBoss Core Services Apache\nHTTP Server 2.4.23 Service Pack 2, and includes bug fixes, which are\ndocumented in the Release Notes document linked to in the References. \n\nSecurity Fix(es):\n\n* An out-of-bounds array dereference was found in apr_time_exp_get(). An\nattacker could abuse an unvalidated usage of this function to cause a\ndenial of service or potentially lead to data leak. (CVE-2017-12613)\n\n* It was discovered that the use of httpd\u0027s ap_get_basic_auth_pw() API\nfunction outside of the authentication phase could lead to authentication\nbypass. A remote attacker could possibly use this flaw to bypass required\nauthentication if the API was used incorrectly by one of the modules used\nby httpd. (CVE-2017-3167)\n\n* A NULL pointer dereference flaw was found in the httpd\u0027s mod_ssl module. \nA remote attacker could use this flaw to cause an httpd child process to\ncrash if another module used by httpd called a certain API function during\nthe processing of an HTTPS request. (CVE-2017-3169)\n\n* A buffer over-read flaw was found in the httpd\u0027s mod_mime module. A user\npermitted to modify httpd\u0027s MIME configuration could use this flaw to cause\nhttpd child process to crash. (CVE-2017-7679)\n\n* A use-after-free flaw was found in the way httpd handled invalid and\npreviously unregistered HTTP methods specified in the Limit directive used\nin an .htaccess file. A remote attacker could possibly use this flaw to\ndisclose portions of the server memory, or cause httpd child process to\ncrash. (CVE-2017-9798)\n\nRed Hat would like to thank Hanno BAPck for reporting CVE-2017-9798. Bugs fixed (https://bugzilla.redhat.com/):\n\n1463194 - CVE-2017-3167 httpd: ap_get_basic_auth_pw() authentication bypass\n1463197 - CVE-2017-3169 httpd: mod_ssl NULL pointer dereference\n1463207 - CVE-2017-7679 httpd: mod_mime buffer overread\n1490344 - CVE-2017-9798 httpd: Use-after-free by limiting unregistered HTTP method (Optionsbleed)\n1506523 - CVE-2017-12613 apr: Out-of-bounds array deref in apr_time_exp*() functions\n\n6. JIRA issues fixed (https://issues.jboss.org/):\n\nJBCS-402 - Errata for httpd 2.4.23.SP3 RHEL7\n\n7. (CVE-2017-12613)\n\n4", "sources": [ { "db": "NVD", "id": "CVE-2017-12613" }, { "db": "JVNDB", "id": "JVNDB-2017-009633" }, { "db": "BID", "id": "101560" }, { "db": "VULMON", "id": "CVE-2017-12613" }, { "db": "PACKETSTORM", "id": "147393" }, { "db": "PACKETSTORM", "id": "150116" }, { "db": "PACKETSTORM", "id": "146682" }, { "db": "PACKETSTORM", "id": "146687" }, { "db": "PACKETSTORM", "id": "145456" }, { "db": "PACKETSTORM", "id": "146384" } ], "trust": 2.52 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2017-12613", "trust": 3.4 }, { "db": "BID", "id": "101560", "trust": 2.0 }, { "db": "SECTRACK", "id": "1042004", "trust": 1.7 }, { "db": "OPENWALL", "id": "OSS-SECURITY/2021/08/23/1", "trust": 1.7 }, { "db": "JVNDB", "id": "JVNDB-2017-009633", "trust": 0.8 }, { "db": "AUSCERT", "id": "ESB-2018.0660.10", "trust": 0.6 }, { "db": "AUSCERT", "id": "ESB-2019.1429", "trust": 0.6 }, { "db": "AUSCERT", "id": "ESB-2022.0349", "trust": 0.6 }, { "db": "NSFOCUS", "id": "37867", "trust": 0.6 }, { "db": "CNNVD", "id": "CNNVD-201710-1140", "trust": 0.6 }, { "db": "VULMON", "id": "CVE-2017-12613", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "147393", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "150116", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "146682", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "146687", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "145456", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "146384", "trust": 0.1 } ], "sources": [ { "db": "VULMON", "id": "CVE-2017-12613" }, { "db": "BID", "id": "101560" }, { "db": "JVNDB", "id": "JVNDB-2017-009633" }, { "db": "PACKETSTORM", "id": "147393" }, { "db": "PACKETSTORM", "id": "150116" }, { "db": "PACKETSTORM", "id": "146682" }, { "db": "PACKETSTORM", "id": "146687" }, { "db": "PACKETSTORM", "id": "145456" }, { "db": "PACKETSTORM", "id": "146384" }, { "db": "CNNVD", "id": "CNNVD-201710-1140" }, { "db": "NVD", "id": "CVE-2017-12613" } ] }, "id": "VAR-201710-0928", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VARIoT devices database", "id": null } ], "trust": 0.4351719057142857 }, "last_update_date": "2024-07-23T20:32:14.616000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Revision 1807976", "trust": 0.8, "url": "https://svn.apache.org/viewvc?view=revision\u0026revision=1807976" }, { "title": "[Announce] Apache Portable Runtime APR 1.6.3, APR-util 1.6.1 and APR-iconv 1.2.2 Released", "trust": 0.8, "url": "https://lists.apache.org/thread.html/12489f2e4a9f9d390235c16298aca0d20658789de80d553513977f13%40%3cannounce.apache.org%3e" }, { "title": "Apache Portable Runtime Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=75975" }, { "title": "Red Hat: Important: apr security update", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=rhsa-20173270 - security advisory" }, { "title": "Red Hat: Important: apr security update", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=rhsa-20181253 - security advisory" }, { "title": "Red Hat: Important: httpd24-apr security update", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=rhsa-20180316 - security advisory" }, { "title": "Red Hat: Important: Red Hat JBoss Core Services Apache HTTP Server 2.4.23 security update", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=rhsa-20173476 - security advisory" }, { "title": "Red Hat: Important: Red Hat JBoss Core Services Apache HTTP Server 2.4.23 security update", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=rhsa-20173477 - security advisory" }, { "title": "Amazon Linux AMI: ALAS-2017-928", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=amazon_linux_ami\u0026qid=alas-2017-928" }, { "title": "Red Hat: Important: Red Hat JBoss Core Services Apache HTTP Server 2.4.23 security update", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=rhsa-20173475 - security advisory" }, { "title": "Debian CVElist Bug Report Logs: apr: CVE-2021-35940", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=debian_cvelist_bugreportlogs\u0026qid=5e2c059c594375a9d2d057d113f3ebb3" }, { "title": "Debian CVElist Bug Report Logs: apr-util: CVE-2017-12618", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=debian_cvelist_bugreportlogs\u0026qid=0c479ddd46c3cd7bf25cdba9c0b98fc7" }, { "title": "Debian CVElist Bug Report Logs: apr: CVE-2017-12613", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=debian_cvelist_bugreportlogs\u0026qid=8dd946abfc105514416d717cf93b9295" }, { "title": "Arch Linux Advisories: [ASA-201710-32] apr: information disclosure", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=arch_linux_advisories\u0026qid=asa-201710-32" }, { "title": "Red Hat: CVE-2017-12613", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_cve_database\u0026qid=cve-2017-12613" }, { "title": "Red Hat: Important: Red Hat JBoss Web Server 3.1.0 Service Pack 2 security update", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=rhsa-20180466 - security advisory" }, { "title": "Red Hat: Important: Red Hat JBoss Web Server 3.1.0 Service Pack 2 security update", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=rhsa-20180465 - security advisory" }, { "title": "Arch Linux Issues: ", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=arch_linux_issues\u0026qid=cve-2017-12613" }, { "title": "IBM: IBM Security Bulletin: IBM Security SiteProtector System is affected by Apache HTTP Server vulnerabilities", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=ibm_psirt_blog\u0026qid=ad93b14b1ee3141c8131a0ba5a4f74ac" }, { "title": "Oracle Solaris Third Party Bulletins: Oracle Solaris Third Party Bulletin - July 2018", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=oracle_solaris_third_party_bulletins\u0026qid=586e6062440cdd312211d748e028164e" }, { "title": "Oracle Linux Bulletins: Oracle Linux Bulletin - October 2017", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=oracle_linux_bulletins\u0026qid=7251d5e5f2b1771951980ad7cfde50ba" }, { "title": "", "trust": 0.1, "url": "https://github.com/live-hack-cve/cve-2021-35940 " }, { "title": "CVE-2021-35940", "trust": 0.1, "url": "https://github.com/alaial90/cve-2021-35940 " } ], "sources": [ { "db": "VULMON", "id": "CVE-2017-12613" }, { "db": "JVNDB", "id": "JVNDB-2017-009633" }, { "db": "CNNVD", "id": "CNNVD-201710-1140" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-125", "trust": 1.0 }, { "problemtype": "CWE-119", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2017-009633" }, { "db": "NVD", "id": "CVE-2017-12613" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.3, "url": "http://www.securityfocus.com/bid/101560" }, { "trust": 2.0, "url": "https://lists.apache.org/thread.html/12489f2e4a9f9d390235c16298aca0d20658789de80d553513977f13%40%3cannounce.apache.org%3e" }, { "trust": 1.8, "url": "https://access.redhat.com/errata/rhsa-2017:3270" }, { "trust": 1.8, "url": "https://access.redhat.com/errata/rhsa-2017:3476" }, { "trust": 1.8, "url": "https://access.redhat.com/errata/rhsa-2018:0316" }, { "trust": 1.8, "url": "https://access.redhat.com/errata/rhsa-2018:0466" }, { "trust": 1.8, "url": "https://access.redhat.com/errata/rhsa-2018:0465" }, { "trust": 1.8, "url": "https://access.redhat.com/errata/rhsa-2018:1253" }, { "trust": 1.7, "url": "https://svn.apache.org/viewvc?view=revision\u0026revision=1807976" }, { "trust": 1.7, "url": "https://access.redhat.com/errata/rhsa-2017:3477" }, { "trust": 1.7, "url": "https://access.redhat.com/errata/rhsa-2017:3475" }, { "trust": 1.7, "url": "http://www.apache.org/dist/apr/announcement1.x.html" }, { "trust": 1.7, "url": "https://lists.debian.org/debian-lts-announce/2017/11/msg00005.html" }, { "trust": 1.7, "url": "http://www.securitytracker.com/id/1042004" }, { "trust": 1.7, "url": "http://www.openwall.com/lists/oss-security/2021/08/23/1" }, { "trust": 1.7, "url": "https://lists.debian.org/debian-lts-announce/2022/01/msg00023.html" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2017-12613" }, { "trust": 1.1, "url": "https://lists.apache.org/thread.html/rcc48a0acebbd74bbdeebc02ff228bb72c0631b21823fffe27d4691e9%40%3ccommits.apr.apache.org%3e" }, { "trust": 1.1, "url": "https://lists.apache.org/thread.html/r270dd5022db194b78acaf509216a33c85f3da43757defa05cc766339%40%3ccommits.apr.apache.org%3e" }, { "trust": 1.1, "url": "https://lists.apache.org/thread.html/ra2868b53339a6af65577146ad87016368c138388b09bff9d2860f50e%40%3cdev.apr.apache.org%3e" }, { "trust": 1.1, "url": "https://lists.apache.org/thread.html/rb1f3c85f50fbd924a0051675118d1609e57957a02ece7facb723155b%40%3cannounce.apache.org%3e" }, { "trust": 1.1, "url": "https://lists.apache.org/thread.html/ra38094406cc38a05218ebd1158187feda021b0c3a1df400bbf296af8%40%3cdev.apr.apache.org%3e" }, { "trust": 0.8, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2017-12613" }, { "trust": 0.6, "url": "http://www.nsfocus.net/vulndb/37867" }, { "trust": 0.6, "url": "https://lists.apache.org/thread.html/rb1f3c85f50fbd924a0051675118d1609e57957a02ece7facb723155b@%3cannounce.apache.org%3e" }, { "trust": 0.6, "url": "https://lists.apache.org/thread.html/rcc48a0acebbd74bbdeebc02ff228bb72c0631b21823fffe27d4691e9@%3ccommits.apr.apache.org%3e" }, { "trust": 0.6, "url": "https://lists.apache.org/thread.html/r270dd5022db194b78acaf509216a33c85f3da43757defa05cc766339@%3ccommits.apr.apache.org%3e" }, { "trust": 0.6, "url": "https://lists.apache.org/thread.html/ra2868b53339a6af65577146ad87016368c138388b09bff9d2860f50e@%3cdev.apr.apache.org%3e" }, { "trust": 0.6, "url": "https://lists.apache.org/thread.html/ra38094406cc38a05218ebd1158187feda021b0c3a1df400bbf296af8@%3cdev.apr.apache.org%3e" }, { "trust": 0.6, "url": "http://www.ibm.com/support/docview.wss?uid=swg22014121" }, { "trust": 0.6, "url": "http://www.ibm.com/support/docview.wss?uid=ibm10880665" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/79734" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2022.0349" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2018.0660.10/" }, { "trust": 0.5, "url": "https://www.redhat.com/mailman/listinfo/rhsa-announce" }, { "trust": 0.5, "url": "https://access.redhat.com/security/cve/cve-2017-12613" }, { "trust": 0.5, "url": "https://bugzilla.redhat.com/):" }, { "trust": 0.5, "url": "https://access.redhat.com/security/team/contact/" }, { "trust": 0.5, "url": "https://access.redhat.com/security/updates/classification/#important" }, { "trust": 0.4, "url": "https://access.redhat.com/security/team/key/" }, { "trust": 0.4, "url": "https://access.redhat.com/articles/11258" }, { "trust": 0.3, "url": "http://www.apache.org/" }, { "trust": 0.3, "url": "https://support.f5.com/csp/article/k52319810" }, { "trust": 0.2, "url": "https://access.redhat.com/security/cve/cve-2017-12617" }, { "trust": 0.2, "url": "https://access.redhat.com/security/cve/cve-2017-12616" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2017-12617" }, { "trust": 0.2, "url": "https://access.redhat.com/security/cve/cve-2017-15698" }, { "trust": 0.2, "url": "https://access.redhat.com/security/cve/cve-2018-1305" }, { "trust": 0.2, "url": "https://access.redhat.com/documentation/en-us/red_hat_jboss_web_server/" }, { "trust": 0.2, "url": "https://access.redhat.com/security/cve/cve-2017-12615" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2017-12615" }, { "trust": 0.2, "url": "https://access.redhat.com/security/cve/cve-2018-1304" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-1304" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2017-12616" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-1305" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2017-15698" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/125.html" }, { "trust": 0.1, "url": "https://tools.cisco.com/security/center/viewalert.x?alertid=56070" }, { "trust": 0.1, "url": "https://nvd.nist.gov" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2017-12618" }, { "trust": 0.1, "url": "https://support.apple.com/kb/ht201222" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-4203" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-4336" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-4334" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-4338" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-4308" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-4332" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-4326" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-4153" }, { "trust": 0.1, "url": "https://support.apple.com/downloads/" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-4340" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-4304" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-4126" }, { "trust": 0.1, "url": "https://www.apple.com/support/security/pgp/" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-4324" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-4331" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-5334" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-4310" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2016-1777" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-4295" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-5333" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-4333" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-4341" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-3646" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-3194" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-4321" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-4337" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-3639" }, { "trust": 0.1, "url": "https://access.redhat.com/solutions/2435491" }, { "trust": 0.1, "url": "https://access.redhat.com/security/vulnerabilities/httpoxy" }, { "trust": 0.1, "url": "https://access.redhat.com/jbossnetwork/restricted/listsoftware.html?product=webserver\u0026downloadtype=securitypatches\u0026version=3.1" }, { "trust": 0.1, "url": "https://issues.jboss.org/):" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2017-9798" }, { "trust": 0.1, "url": "https://access.redhat.com/documentation/en/red-hat-jboss-core-services/" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2017-7679" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2017-3167" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2017-7679" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2017-3169" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2017-3169" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2017-9798" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2017-3167" } ], "sources": [ { "db": "VULMON", "id": "CVE-2017-12613" }, { "db": "BID", "id": "101560" }, { "db": "JVNDB", "id": "JVNDB-2017-009633" }, { "db": "PACKETSTORM", "id": "147393" }, { "db": "PACKETSTORM", "id": "150116" }, { "db": "PACKETSTORM", "id": "146682" }, { "db": "PACKETSTORM", "id": "146687" }, { "db": "PACKETSTORM", "id": "145456" }, { "db": "PACKETSTORM", "id": "146384" }, { "db": "CNNVD", "id": "CNNVD-201710-1140" }, { "db": "NVD", "id": "CVE-2017-12613" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULMON", "id": "CVE-2017-12613" }, { "db": "BID", "id": "101560" }, { "db": "JVNDB", "id": "JVNDB-2017-009633" }, { "db": "PACKETSTORM", "id": "147393" }, { "db": "PACKETSTORM", "id": "150116" }, { "db": "PACKETSTORM", "id": "146682" }, { "db": "PACKETSTORM", "id": "146687" }, { "db": "PACKETSTORM", "id": "145456" }, { "db": "PACKETSTORM", "id": "146384" }, { "db": "CNNVD", "id": "CNNVD-201710-1140" }, { "db": "NVD", "id": "CVE-2017-12613" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2017-10-24T00:00:00", "db": "VULMON", "id": "CVE-2017-12613" }, { "date": "2017-10-23T00:00:00", "db": "BID", "id": "101560" }, { "date": "2017-11-16T00:00:00", "db": "JVNDB", "id": "JVNDB-2017-009633" }, { "date": "2018-04-27T14:51:47", "db": "PACKETSTORM", "id": "147393" }, { "date": "2018-10-31T16:10:50", "db": "PACKETSTORM", "id": "150116" }, { "date": "2018-03-07T18:08:49", "db": "PACKETSTORM", "id": "146682" }, { "date": "2018-03-07T18:12:55", "db": "PACKETSTORM", "id": "146687" }, { "date": "2017-12-17T15:28:41", "db": "PACKETSTORM", "id": "145456" }, { "date": "2018-02-13T19:22:00", "db": "PACKETSTORM", "id": "146384" }, { "date": "2017-10-31T00:00:00", "db": "CNNVD", "id": "CNNVD-201710-1140" }, { "date": "2017-10-24T01:29:02", "db": "NVD", "id": "CVE-2017-12613" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2023-11-07T00:00:00", "db": "VULMON", "id": "CVE-2017-12613" }, { "date": "2019-02-14T08:00:00", "db": "BID", "id": "101560" }, { "date": "2017-11-16T00:00:00", "db": "JVNDB", "id": "JVNDB-2017-009633" }, { "date": "2022-01-26T00:00:00", "db": "CNNVD", "id": "CNNVD-201710-1140" }, { "date": "2023-11-07T02:38:26.083000", "db": "NVD", "id": "CVE-2017-12613" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "local", "sources": [ { "db": "CNNVD", "id": "CNNVD-201710-1140" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Apache Portable Runtime Buffer error vulnerability", "sources": [ { "db": "JVNDB", "id": "JVNDB-2017-009633" }, { "db": "CNNVD", "id": "CNNVD-201710-1140" } ], "trust": 1.4 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "buffer error", "sources": [ { "db": "CNNVD", "id": "CNNVD-201710-1140" } ], "trust": 0.6 } }
ghsa-v99m-xvmc-cgf3
Vulnerability from github
When apr_time_exp() or apr_os_exp_time() functions are invoked with an invalid month field value in Apache Portable Runtime APR 1.6.2 and prior, out of bounds memory may be accessed in converting this value to an apr_time_exp_t value, potentially revealing the contents of a different static heap value or resulting in program termination, and may represent an information disclosure or denial of service vulnerability to applications which call these APR functions with unvalidated external input.
{ "affected": [], "aliases": [ "CVE-2017-12613" ], "database_specific": { "cwe_ids": [ "CWE-125" ], "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2017-10-24T01:29:00Z", "severity": "HIGH" }, "details": "When apr_time_exp*() or apr_os_exp_time*() functions are invoked with an invalid month field value in Apache Portable Runtime APR 1.6.2 and prior, out of bounds memory may be accessed in converting this value to an apr_time_exp_t value, potentially revealing the contents of a different static heap value or resulting in program termination, and may represent an information disclosure or denial of service vulnerability to applications which call these APR functions with unvalidated external input.", "id": "GHSA-v99m-xvmc-cgf3", "modified": "2022-05-13T01:02:11Z", "published": "2022-05-13T01:02:11Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-12613" }, { "type": "WEB", "url": "https://svn.apache.org/viewvc?view=revision\u0026revision=1807976" }, { "type": "WEB", "url": "https://lists.debian.org/debian-lts-announce/2022/01/msg00023.html" }, { "type": "WEB", "url": "https://lists.debian.org/debian-lts-announce/2017/11/msg00005.html" }, { "type": "WEB", "url": "https://lists.apache.org/thread.html/rcc48a0acebbd74bbdeebc02ff228bb72c0631b21823fffe27d4691e9@%3Ccommits.apr.apache.org%3E" }, { "type": "WEB", "url": "https://lists.apache.org/thread.html/rb1f3c85f50fbd924a0051675118d1609e57957a02ece7facb723155b@%3Cannounce.apache.org%3E" }, { "type": "WEB", "url": "https://lists.apache.org/thread.html/ra38094406cc38a05218ebd1158187feda021b0c3a1df400bbf296af8@%3Cdev.apr.apache.org%3E" }, { "type": "WEB", "url": "https://lists.apache.org/thread.html/ra2868b53339a6af65577146ad87016368c138388b09bff9d2860f50e@%3Cdev.apr.apache.org%3E" }, { "type": "WEB", "url": "https://lists.apache.org/thread.html/r270dd5022db194b78acaf509216a33c85f3da43757defa05cc766339@%3Ccommits.apr.apache.org%3E" }, { "type": "WEB", "url": "https://lists.apache.org/thread.html/12489f2e4a9f9d390235c16298aca0d20658789de80d553513977f13%40%3Cannounce.apache.org%3E" }, { "type": "WEB", "url": "https://access.redhat.com/errata/RHSA-2018:1253" }, { "type": "WEB", "url": "https://access.redhat.com/errata/RHSA-2018:0466" }, { "type": "WEB", "url": "https://access.redhat.com/errata/RHSA-2018:0465" }, { "type": "WEB", "url": "https://access.redhat.com/errata/RHSA-2018:0316" }, { "type": "WEB", "url": "https://access.redhat.com/errata/RHSA-2017:3477" }, { "type": "WEB", "url": "https://access.redhat.com/errata/RHSA-2017:3476" }, { "type": "WEB", "url": "https://access.redhat.com/errata/RHSA-2017:3475" }, { "type": "WEB", "url": "https://access.redhat.com/errata/RHSA-2017:3270" }, { "type": "WEB", "url": "http://www.apache.org/dist/apr/Announcement1.x.html" }, { "type": "WEB", "url": "http://www.openwall.com/lists/oss-security/2021/08/23/1" }, { "type": "WEB", "url": "http://www.securityfocus.com/bid/101560" }, { "type": "WEB", "url": "http://www.securitytracker.com/id/1042004" } ], "schema_version": "1.4.0", "severity": [ { "score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H", "type": "CVSS_V3" } ] }
gsd-2017-12613
Vulnerability from gsd
{ "GSD": { "alias": "CVE-2017-12613", "description": "When apr_time_exp*() or apr_os_exp_time*() functions are invoked with an invalid month field value in Apache Portable Runtime APR 1.6.2 and prior, out of bounds memory may be accessed in converting this value to an apr_time_exp_t value, potentially revealing the contents of a different static heap value or resulting in program termination, and may represent an information disclosure or denial of service vulnerability to applications which call these APR functions with unvalidated external input.", "id": "GSD-2017-12613", "references": [ "https://www.suse.com/security/cve/CVE-2017-12613.html", "https://access.redhat.com/errata/RHSA-2018:1253", "https://access.redhat.com/errata/RHSA-2018:0466", "https://access.redhat.com/errata/RHSA-2018:0465", "https://access.redhat.com/errata/RHSA-2018:0316", "https://access.redhat.com/errata/RHSA-2017:3477", "https://access.redhat.com/errata/RHSA-2017:3476", "https://access.redhat.com/errata/RHSA-2017:3475", "https://access.redhat.com/errata/RHSA-2017:3270", "https://advisories.mageia.org/CVE-2017-12613.html", "https://security.archlinux.org/CVE-2017-12613", "https://alas.aws.amazon.com/cve/html/CVE-2017-12613.html", "https://linux.oracle.com/cve/CVE-2017-12613.html" ] }, "gsd": { "metadata": { "exploitCode": "unknown", "remediation": "unknown", "reportConfidence": "confirmed", "type": "vulnerability" }, "osvSchema": { "aliases": [ "CVE-2017-12613" ], "details": "When apr_time_exp*() or apr_os_exp_time*() functions are invoked with an invalid month field value in Apache Portable Runtime APR 1.6.2 and prior, out of bounds memory may be accessed in converting this value to an apr_time_exp_t value, potentially revealing the contents of a different static heap value or resulting in program termination, and may represent an information disclosure or denial of service vulnerability to applications which call these APR functions with unvalidated external input.", "id": "GSD-2017-12613", "modified": "2023-12-13T01:21:03.641535Z", "schema_version": "1.4.0" } }, "namespaces": { "cve.org": { "CVE_data_meta": { "ASSIGNER": "security@apache.org", "ID": "CVE-2017-12613", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Apache Portable Runtime", "version": { "version_data": [ { "version_value": "1.6.2 and prior" } ] } } ] }, "vendor_name": "Apache Software Foundation" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "When apr_time_exp*() or apr_os_exp_time*() functions are invoked with an invalid month field value in Apache Portable Runtime APR 1.6.2 and prior, out of bounds memory may be accessed in converting this value to an apr_time_exp_t value, potentially revealing the contents of a different static heap value or resulting in program termination, and may represent an information disclosure or denial of service vulnerability to applications which call these APR functions with unvalidated external input." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "[debian-lts-announce] 20171106 [SECURITY] [DLA 1162-1] apr security update", "refsource": "MLIST", "url": "https://lists.debian.org/debian-lts-announce/2017/11/msg00005.html" }, { "name": "RHSA-2018:0316", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2018:0316" }, { "name": "https://svn.apache.org/viewvc?view=revision\u0026revision=1807976", "refsource": "CONFIRM", "url": "https://svn.apache.org/viewvc?view=revision\u0026revision=1807976" }, { "name": "1042004", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1042004" }, { "name": "RHSA-2017:3475", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2017:3475" }, { "name": "RHSA-2018:0465", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2018:0465" }, { "name": "http://www.apache.org/dist/apr/Announcement1.x.html", "refsource": "CONFIRM", "url": "http://www.apache.org/dist/apr/Announcement1.x.html" }, { "name": "RHSA-2017:3270", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2017:3270" }, { "name": "[announce] 20171023 Apache Portable Runtime APR 1.6.3, APR-util 1.6.1 and APR-iconv 1.2.2 Released", "refsource": "MLIST", "url": "https://lists.apache.org/thread.html/12489f2e4a9f9d390235c16298aca0d20658789de80d553513977f13%40%3Cannounce.apache.org%3E" }, { "name": "RHSA-2017:3476", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2017:3476" }, { "name": "RHSA-2018:1253", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2018:1253" }, { "name": "RHSA-2017:3477", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2017:3477" }, { "name": "RHSA-2018:0466", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2018:0466" }, { "name": "101560", "refsource": "BID", "url": "http://www.securityfocus.com/bid/101560" }, { "name": "[apr-commits] 20210816 svn commit: r1892358 - /apr/apr/branches/1.7.x/CHANGES", "refsource": "MLIST", "url": "https://lists.apache.org/thread.html/rcc48a0acebbd74bbdeebc02ff228bb72c0631b21823fffe27d4691e9@%3Ccommits.apr.apache.org%3E" }, { "name": "[apr-commits] 20210820 svn commit: r49582 - /release/apr/patches/apr-1.7.0-CVE-2021-35940.patch", "refsource": "MLIST", "url": "https://lists.apache.org/thread.html/r270dd5022db194b78acaf509216a33c85f3da43757defa05cc766339@%3Ccommits.apr.apache.org%3E" }, { "name": "[apr-dev] 20210823 CVE-2021-35940: Apache Portable Runtime (APR): Regression of CVE-2017-12613", "refsource": "MLIST", "url": "https://lists.apache.org/thread.html/ra2868b53339a6af65577146ad87016368c138388b09bff9d2860f50e@%3Cdev.apr.apache.org%3E" }, { "name": "[oss-security] 20210823 CVE-2021-35940: Apache Portable Runtime (APR): Regression of CVE-2017-12613", "refsource": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2021/08/23/1" }, { "name": "[announce] 20210823 CVE-2021-35940: Apache Portable Runtime (APR): Regression of CVE-2017-12613", "refsource": "MLIST", "url": "https://lists.apache.org/thread.html/rb1f3c85f50fbd924a0051675118d1609e57957a02ece7facb723155b@%3Cannounce.apache.org%3E" }, { "name": "[apr-dev] 20210916 Re: CVE-2021-35940: Apache Portable Runtime (APR): Regression of CVE-2017-12613", "refsource": "MLIST", "url": "https://lists.apache.org/thread.html/ra38094406cc38a05218ebd1158187feda021b0c3a1df400bbf296af8@%3Cdev.apr.apache.org%3E" }, { "name": "[debian-lts-announce] 20220124 [SECURITY] [DLA 2897-1] apr security update", "refsource": "MLIST", "url": "https://lists.debian.org/debian-lts-announce/2022/01/msg00023.html" } ] } }, "nvd.nist.gov": { "configurations": { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:apache:portable_runtime:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "1.7.0", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:redhat:jboss_core_services:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:redhat:jboss_core_services:1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:redhat:jboss_enterprise_web_server:3.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:redhat:software_collections:1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_eus:6.7:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_eus:7.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_server_aus:6.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_server_aus:6.5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_server_aus:6.6:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_server_aus:7.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_server_tus:6.6:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_server_tus:7.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_server_tus:7.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] }, "cve": { "CVE_data_meta": { "ASSIGNER": "security@apache.org", "ID": "CVE-2017-12613" }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "en", "value": "When apr_time_exp*() or apr_os_exp_time*() functions are invoked with an invalid month field value in Apache Portable Runtime APR 1.6.2 and prior, out of bounds memory may be accessed in converting this value to an apr_time_exp_t value, potentially revealing the contents of a different static heap value or resulting in program termination, and may represent an information disclosure or denial of service vulnerability to applications which call these APR functions with unvalidated external input." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "en", "value": "CWE-125" } ] } ] }, "references": { "reference_data": [ { "name": "[announce] 20171023 Apache Portable Runtime APR 1.6.3, APR-util 1.6.1 and APR-iconv 1.2.2 Released", "refsource": "MLIST", "tags": [ "Issue Tracking", "Vendor Advisory" ], "url": "https://lists.apache.org/thread.html/12489f2e4a9f9d390235c16298aca0d20658789de80d553513977f13%40%3Cannounce.apache.org%3E" }, { "name": "101560", "refsource": "BID", "tags": [ "Broken Link" ], "url": "http://www.securityfocus.com/bid/101560" }, { "name": "https://svn.apache.org/viewvc?view=revision\u0026revision=1807976", "refsource": "CONFIRM", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://svn.apache.org/viewvc?view=revision\u0026revision=1807976" }, { "name": "RHSA-2017:3270", "refsource": "REDHAT", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2017:3270" }, { "name": "RHSA-2017:3477", "refsource": "REDHAT", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2017:3477" }, { "name": "RHSA-2017:3476", "refsource": "REDHAT", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2017:3476" }, { "name": "RHSA-2017:3475", "refsource": "REDHAT", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2017:3475" }, { "name": "http://www.apache.org/dist/apr/Announcement1.x.html", "refsource": "CONFIRM", "tags": [ "Release Notes", "Vendor Advisory" ], "url": "http://www.apache.org/dist/apr/Announcement1.x.html" }, { "name": "[debian-lts-announce] 20171106 [SECURITY] [DLA 1162-1] apr security update", "refsource": "MLIST", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2017/11/msg00005.html" }, { "name": "RHSA-2018:0316", "refsource": "REDHAT", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2018:0316" }, { "name": "RHSA-2018:0466", "refsource": "REDHAT", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2018:0466" }, { "name": "RHSA-2018:0465", "refsource": "REDHAT", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2018:0465" }, { "name": "RHSA-2018:1253", "refsource": "REDHAT", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2018:1253" }, { "name": "1042004", "refsource": "SECTRACK", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1042004" }, { "name": "[apr-commits] 20210816 svn commit: r1892358 - /apr/apr/branches/1.7.x/CHANGES", "refsource": "MLIST", "tags": [ "Mailing List", "Patch", "Vendor Advisory" ], "url": "https://lists.apache.org/thread.html/rcc48a0acebbd74bbdeebc02ff228bb72c0631b21823fffe27d4691e9@%3Ccommits.apr.apache.org%3E" }, { "name": "[apr-commits] 20210820 svn commit: r49582 - /release/apr/patches/apr-1.7.0-CVE-2021-35940.patch", "refsource": "MLIST", "tags": [ "Mailing List", "Patch", "Vendor Advisory" ], "url": "https://lists.apache.org/thread.html/r270dd5022db194b78acaf509216a33c85f3da43757defa05cc766339@%3Ccommits.apr.apache.org%3E" }, { "name": "[oss-security] 20210823 CVE-2021-35940: Apache Portable Runtime (APR): Regression of CVE-2017-12613", "refsource": "MLIST", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://www.openwall.com/lists/oss-security/2021/08/23/1" }, { "name": "[apr-dev] 20210823 CVE-2021-35940: Apache Portable Runtime (APR): Regression of CVE-2017-12613", "refsource": "MLIST", "tags": [ "Mailing List", "Vendor Advisory" ], "url": "https://lists.apache.org/thread.html/ra2868b53339a6af65577146ad87016368c138388b09bff9d2860f50e@%3Cdev.apr.apache.org%3E" }, { "name": "[announce] 20210823 CVE-2021-35940: Apache Portable Runtime (APR): Regression of CVE-2017-12613", "refsource": "MLIST", "tags": [ "Mailing List", "Vendor Advisory" ], "url": "https://lists.apache.org/thread.html/rb1f3c85f50fbd924a0051675118d1609e57957a02ece7facb723155b@%3Cannounce.apache.org%3E" }, { "name": "[apr-dev] 20210916 Re: CVE-2021-35940: Apache Portable Runtime (APR): Regression of CVE-2017-12613", "refsource": "MLIST", "tags": [ "Mailing List", "Vendor Advisory" ], "url": "https://lists.apache.org/thread.html/ra38094406cc38a05218ebd1158187feda021b0c3a1df400bbf296af8@%3Cdev.apr.apache.org%3E" }, { "name": "[debian-lts-announce] 20220124 [SECURITY] [DLA 2897-1] apr security update", "refsource": "MLIST", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2022/01/msg00023.html" } ] } }, "impact": { "baseMetricV2": { "cvssV2": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 3.6, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 4.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "LOW", "userInteractionRequired": false }, "baseMetricV3": { "cvssV3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.2 } }, "lastModifiedDate": "2022-04-18T18:16Z", "publishedDate": "2017-10-24T01:29Z" } } }
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.