Action not permitted
Modal body text goes here.
Modal Title
Modal Body
cve-2019-0215
Vulnerability from cvelistv5
Published
2019-04-08 19:25
Modified
2024-08-04 17:44
Severity ?
EPSS score ?
Summary
In Apache HTTP Server 2.4 releases 2.4.37 and 2.4.38, a bug in mod_ssl when using per-location client certificate verification with TLSv1.3 allowed a client to bypass configured access control restrictions.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | Apache | Apache HTTP Server |
Version: 2.4.37 Version: 2.4.38 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T17:44:15.365Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "[oss-security] 20190401 CVE-2019-0215: mod_ssl access control bypass", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2019/04/02/4" }, { "name": "[httpd-cvs] 20190402 svn commit: r1856807 - /httpd/test/framework/trunk/t/security/CVE-2019-0215.t", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.apache.org/thread.html/2d6bd429a0ba9af1580da896575cfca6e42bb05e7536562d4b095fcf%40%3Ccvs.httpd.apache.org%3E" }, { "name": "107667", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/107667" }, { "name": "FEDORA-2019-cf7695b470", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WETXNQWNQLWHV6XNW6YTO5UGDTIWAQGT/" }, { "name": "FEDORA-2019-119b14075a", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EZRMTEIGZKYFNGIDOTXN3GNEJTLVCYU7/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://httpd.apache.org/security/vulnerabilities_24.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://support.f5.com/csp/article/K59440504" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://security.netapp.com/advisory/ntap-20190423-0001/" }, { "name": "RHSA-2019:0980", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2019:0980" }, { "name": "FEDORA-2019-a4ed7400f4", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ALIR5S3O7NRHEGFMIDMUSYQIZOE4TJJN/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html" }, { "name": "[httpd-dev] 20190804 Re: svn commit: r1856807 - /httpd/test/framework/trunk/t/security/CVE-2019-0215.t", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.apache.org/thread.html/117bc3f09847ebf020b1bb70301ebcc105ddc446856150b63f37f8eb%40%3Cdev.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20190806 svn commit: r1864463 - /httpd/test/framework/trunk/t/security/CVE-2019-0215.t", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.apache.org/thread.html/bc1a6d4137798565ab02e60079b6788442147f4efeb4200c665bed5b%40%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-dev] 20190806 Re: svn commit: r1856807 - /httpd/test/framework/trunk/t/security/CVE-2019-0215.t", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.apache.org/thread.html/5b1e7d66c5adf286f14f6cc0f857b6fca107444f68aed9e70eedab47%40%3Cdev.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20190815 svn commit: r1048743 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.apache.org/thread.html/56c2e7cc9deb1c12a843d0dc251ea7fd3e7e80293cde02fcd65286ba%40%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20190815 svn commit: r1048742 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.apache.org/thread.html/84a3714f0878781f6ed84473d1a503d2cc382277e100450209231830%40%3Ccvs.httpd.apache.org%3E" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.oracle.com/security-alerts/cpujan2020.html" }, { "name": "[httpd-cvs] 20200401 svn commit: r1058586 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.apache.org/thread.html/rd18c3c43602e66f9cdcf09f1de233804975b9572b0456cc582390b6f%40%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20200401 svn commit: r1058587 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.apache.org/thread.html/re3d27b6250aa8548b8845d314bb8a350b3df326cacbbfdfe4d455234%40%3Ccvs.httpd.apache.org%3E" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.oracle.com/security-alerts/cpuapr2020.html" }, { "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20210330 svn commit: r1073143 [3/3] - in /websites/staging/httpd/trunk/content: ./ security/", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.apache.org/thread.html/r06f0d87ebb6d59ed8379633f36f72f5b1f79cadfda72ede0830b42cf%40%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20210330 svn commit: r1073140 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a%40%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20210330 svn commit: r1073139 [12/13] - in /websites/staging/httpd/trunk/content: ./ security/json/", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.apache.org/thread.html/r03ee478b3dda3e381fd6189366fa7af97c980d2f602846eef935277d%40%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20210330 svn commit: r1888194 [12/13] - /httpd/site/trunk/content/security/json/", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.apache.org/thread.html/rd2fb621142e7fa187cfe12d7137bf66e7234abcbbcd800074c84a538%40%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20210330 svn commit: r1073149 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20210330 svn commit: r1073149 [12/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.apache.org/thread.html/re473305a65b4db888e3556e4dae10c2a04ee89dcff2e26ecdbd860a9%40%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20210606 svn commit: r1075470 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/json/CVE-2020-13938.json security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.apache.org/thread.html/r76142b8c5119df2178be7c2dba88fde552eedeec37ea993dfce68d1d%40%3Ccvs.httpd.apache.org%3E" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Apache HTTP Server", "vendor": "Apache", "versions": [ { "status": "affected", "version": "2.4.37" }, { "status": "affected", "version": "2.4.38" } ] } ], "datePublic": "2019-04-01T00:00:00", "descriptions": [ { "lang": "en", "value": "In Apache HTTP Server 2.4 releases 2.4.37 and 2.4.38, a bug in mod_ssl when using per-location client certificate verification with TLSv1.3 allowed a client to bypass configured access control restrictions." } ], "problemTypes": [ { "descriptions": [ { "description": "Access Control Bypass", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-06-06T10:11:45", "orgId": "f0158376-9dc2-43b6-827c-5f631a4d8d09", "shortName": "apache" }, "references": [ { "name": "[oss-security] 20190401 CVE-2019-0215: mod_ssl access control bypass", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openwall.com/lists/oss-security/2019/04/02/4" }, { "name": "[httpd-cvs] 20190402 svn commit: r1856807 - /httpd/test/framework/trunk/t/security/CVE-2019-0215.t", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.apache.org/thread.html/2d6bd429a0ba9af1580da896575cfca6e42bb05e7536562d4b095fcf%40%3Ccvs.httpd.apache.org%3E" }, { "name": "107667", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/107667" }, { "name": "FEDORA-2019-cf7695b470", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WETXNQWNQLWHV6XNW6YTO5UGDTIWAQGT/" }, { "name": "FEDORA-2019-119b14075a", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EZRMTEIGZKYFNGIDOTXN3GNEJTLVCYU7/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://httpd.apache.org/security/vulnerabilities_24.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://support.f5.com/csp/article/K59440504" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://security.netapp.com/advisory/ntap-20190423-0001/" }, { "name": "RHSA-2019:0980", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2019:0980" }, { "name": "FEDORA-2019-a4ed7400f4", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ALIR5S3O7NRHEGFMIDMUSYQIZOE4TJJN/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html" }, { "name": "[httpd-dev] 20190804 Re: svn commit: r1856807 - /httpd/test/framework/trunk/t/security/CVE-2019-0215.t", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.apache.org/thread.html/117bc3f09847ebf020b1bb70301ebcc105ddc446856150b63f37f8eb%40%3Cdev.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20190806 svn commit: r1864463 - /httpd/test/framework/trunk/t/security/CVE-2019-0215.t", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.apache.org/thread.html/bc1a6d4137798565ab02e60079b6788442147f4efeb4200c665bed5b%40%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-dev] 20190806 Re: svn commit: r1856807 - /httpd/test/framework/trunk/t/security/CVE-2019-0215.t", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.apache.org/thread.html/5b1e7d66c5adf286f14f6cc0f857b6fca107444f68aed9e70eedab47%40%3Cdev.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20190815 svn commit: r1048743 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.apache.org/thread.html/56c2e7cc9deb1c12a843d0dc251ea7fd3e7e80293cde02fcd65286ba%40%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20190815 svn commit: r1048742 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.apache.org/thread.html/84a3714f0878781f6ed84473d1a503d2cc382277e100450209231830%40%3Ccvs.httpd.apache.org%3E" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.oracle.com/security-alerts/cpujan2020.html" }, { "name": "[httpd-cvs] 20200401 svn commit: r1058586 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.apache.org/thread.html/rd18c3c43602e66f9cdcf09f1de233804975b9572b0456cc582390b6f%40%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20200401 svn commit: r1058587 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.apache.org/thread.html/re3d27b6250aa8548b8845d314bb8a350b3df326cacbbfdfe4d455234%40%3Ccvs.httpd.apache.org%3E" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.oracle.com/security-alerts/cpuapr2020.html" }, { "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20210330 svn commit: r1073143 [3/3] - in /websites/staging/httpd/trunk/content: ./ security/", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.apache.org/thread.html/r06f0d87ebb6d59ed8379633f36f72f5b1f79cadfda72ede0830b42cf%40%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20210330 svn commit: r1073140 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a%40%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20210330 svn commit: r1073139 [12/13] - in /websites/staging/httpd/trunk/content: ./ security/json/", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.apache.org/thread.html/r03ee478b3dda3e381fd6189366fa7af97c980d2f602846eef935277d%40%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20210330 svn commit: r1888194 [12/13] - /httpd/site/trunk/content/security/json/", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.apache.org/thread.html/rd2fb621142e7fa187cfe12d7137bf66e7234abcbbcd800074c84a538%40%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20210330 svn commit: r1073149 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20210330 svn commit: r1073149 [12/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.apache.org/thread.html/re473305a65b4db888e3556e4dae10c2a04ee89dcff2e26ecdbd860a9%40%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20210606 svn commit: r1075470 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/json/CVE-2020-13938.json security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.apache.org/thread.html/r76142b8c5119df2178be7c2dba88fde552eedeec37ea993dfce68d1d%40%3Ccvs.httpd.apache.org%3E" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@apache.org", "ID": "CVE-2019-0215", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Apache HTTP Server", "version": { "version_data": [ { "version_value": "2.4.37" }, { "version_value": "2.4.38" } ] } } ] }, "vendor_name": "Apache" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "In Apache HTTP Server 2.4 releases 2.4.37 and 2.4.38, a bug in mod_ssl when using per-location client certificate verification with TLSv1.3 allowed a client to bypass configured access control restrictions." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Access Control Bypass" } ] } ] }, "references": { "reference_data": [ { "name": "[oss-security] 20190401 CVE-2019-0215: mod_ssl access control bypass", "refsource": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2019/04/02/4" }, { "name": "[httpd-cvs] 20190402 svn commit: r1856807 - /httpd/test/framework/trunk/t/security/CVE-2019-0215.t", "refsource": "MLIST", "url": "https://lists.apache.org/thread.html/2d6bd429a0ba9af1580da896575cfca6e42bb05e7536562d4b095fcf@%3Ccvs.httpd.apache.org%3E" }, { "name": "107667", "refsource": "BID", "url": "http://www.securityfocus.com/bid/107667" }, { "name": "FEDORA-2019-cf7695b470", "refsource": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WETXNQWNQLWHV6XNW6YTO5UGDTIWAQGT/" }, { "name": "FEDORA-2019-119b14075a", "refsource": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EZRMTEIGZKYFNGIDOTXN3GNEJTLVCYU7/" }, { "name": "https://httpd.apache.org/security/vulnerabilities_24.html", "refsource": "MISC", "url": "https://httpd.apache.org/security/vulnerabilities_24.html" }, { "name": "https://support.f5.com/csp/article/K59440504", "refsource": "CONFIRM", "url": "https://support.f5.com/csp/article/K59440504" }, { "name": "https://security.netapp.com/advisory/ntap-20190423-0001/", "refsource": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20190423-0001/" }, { "name": "RHSA-2019:0980", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2019:0980" }, { "name": "FEDORA-2019-a4ed7400f4", "refsource": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ALIR5S3O7NRHEGFMIDMUSYQIZOE4TJJN/" }, { "name": "https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html", "refsource": "MISC", "url": "https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html" }, { "name": "[httpd-dev] 20190804 Re: svn commit: r1856807 - /httpd/test/framework/trunk/t/security/CVE-2019-0215.t", "refsource": "MLIST", "url": "https://lists.apache.org/thread.html/117bc3f09847ebf020b1bb70301ebcc105ddc446856150b63f37f8eb@%3Cdev.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20190806 svn commit: r1864463 - /httpd/test/framework/trunk/t/security/CVE-2019-0215.t", "refsource": "MLIST", "url": "https://lists.apache.org/thread.html/bc1a6d4137798565ab02e60079b6788442147f4efeb4200c665bed5b@%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-dev] 20190806 Re: svn commit: r1856807 - /httpd/test/framework/trunk/t/security/CVE-2019-0215.t", "refsource": "MLIST", "url": "https://lists.apache.org/thread.html/5b1e7d66c5adf286f14f6cc0f857b6fca107444f68aed9e70eedab47@%3Cdev.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20190815 svn commit: r1048743 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html", "refsource": "MLIST", "url": "https://lists.apache.org/thread.html/56c2e7cc9deb1c12a843d0dc251ea7fd3e7e80293cde02fcd65286ba@%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20190815 svn commit: r1048742 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html", "refsource": "MLIST", "url": "https://lists.apache.org/thread.html/84a3714f0878781f6ed84473d1a503d2cc382277e100450209231830@%3Ccvs.httpd.apache.org%3E" }, { "name": "https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html", "refsource": "MISC", "url": "https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html" }, { "name": "https://www.oracle.com/security-alerts/cpujan2020.html", "refsource": "MISC", "url": "https://www.oracle.com/security-alerts/cpujan2020.html" }, { "name": "[httpd-cvs] 20200401 svn commit: r1058586 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html", "refsource": "MLIST", "url": "https://lists.apache.org/thread.html/rd18c3c43602e66f9cdcf09f1de233804975b9572b0456cc582390b6f@%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20200401 svn commit: r1058587 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html", "refsource": "MLIST", "url": "https://lists.apache.org/thread.html/re3d27b6250aa8548b8845d314bb8a350b3df326cacbbfdfe4d455234@%3Ccvs.httpd.apache.org%3E" }, { "name": "https://www.oracle.com/security-alerts/cpuapr2020.html", "refsource": "MISC", "url": "https://www.oracle.com/security-alerts/cpuapr2020.html" }, { "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/", "refsource": "MLIST", "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20210330 svn commit: r1073143 [3/3] - in /websites/staging/httpd/trunk/content: ./ security/", "refsource": "MLIST", "url": "https://lists.apache.org/thread.html/r06f0d87ebb6d59ed8379633f36f72f5b1f79cadfda72ede0830b42cf@%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20210330 svn commit: r1073140 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html", "refsource": "MLIST", "url": "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20210330 svn commit: r1073139 [12/13] - in /websites/staging/httpd/trunk/content: ./ security/json/", "refsource": "MLIST", "url": "https://lists.apache.org/thread.html/r03ee478b3dda3e381fd6189366fa7af97c980d2f602846eef935277d@%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20210330 svn commit: r1888194 [12/13] - /httpd/site/trunk/content/security/json/", "refsource": "MLIST", "url": "https://lists.apache.org/thread.html/rd2fb621142e7fa187cfe12d7137bf66e7234abcbbcd800074c84a538@%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20210330 svn commit: r1073149 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/", "refsource": "MLIST", "url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20210330 svn commit: r1073149 [12/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/", "refsource": "MLIST", "url": "https://lists.apache.org/thread.html/re473305a65b4db888e3556e4dae10c2a04ee89dcff2e26ecdbd860a9@%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20210606 svn commit: r1075470 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/json/CVE-2020-13938.json security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html", "refsource": "MLIST", "url": "https://lists.apache.org/thread.html/r76142b8c5119df2178be7c2dba88fde552eedeec37ea993dfce68d1d@%3Ccvs.httpd.apache.org%3E" } ] } } } }, "cveMetadata": { "assignerOrgId": "f0158376-9dc2-43b6-827c-5f631a4d8d09", "assignerShortName": "apache", "cveId": "CVE-2019-0215", "datePublished": "2019-04-08T19:25:45", "dateReserved": "2018-11-14T00:00:00", "dateUpdated": "2024-08-04T17:44:15.365Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "vulnerability-lookup:meta": { "fkie_nvd": { "configurations": "[{\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:apache:http_server:2.4.37:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"DE5F8320-A680-4E2F-B32F-F7DBEED09ED6\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:apache:http_server:2.4.38:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"033F6E44-5230-4D11-883C-591D7FC21F36\"}]}]}, {\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:fedoraproject:fedora:29:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D100F7CE-FC64-4CC6-852A-6136D72DA419\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"97A4B8DF-58DA-4AB6-A1F9-331B36409BA3\"}]}]}]", "descriptions": "[{\"lang\": \"en\", \"value\": \"In Apache HTTP Server 2.4 releases 2.4.37 and 2.4.38, a bug in mod_ssl when using per-location client certificate verification with TLSv1.3 allowed a client to bypass configured access control restrictions.\"}, {\"lang\": \"es\", \"value\": \"En Apache HTTP Server 2.4, versiones 2.4.37 y 2.4.38, un error en mod_ssl al utilizar la verificaci\\u00f3n de certificados de cliente por ubicaci\\u00f3n con TLSv1.3 permit\\u00eda a un cliente eludir las restricciones de control de acceso configuradas.\"}]", "id": "CVE-2019-0215", "lastModified": "2024-11-21T04:16:30.333", "metrics": "{\"cvssMetricV30\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"3.0\", \"vectorString\": \"CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H\", \"baseScore\": 7.5, \"baseSeverity\": \"HIGH\", \"attackVector\": \"NETWORK\", \"attackComplexity\": \"HIGH\", \"privilegesRequired\": \"LOW\", \"userInteraction\": \"NONE\", \"scope\": \"UNCHANGED\", \"confidentialityImpact\": \"HIGH\", \"integrityImpact\": \"HIGH\", \"availabilityImpact\": \"HIGH\"}, \"exploitabilityScore\": 1.6, \"impactScore\": 5.9}], \"cvssMetricV2\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"2.0\", \"vectorString\": \"AV:N/AC:M/Au:S/C:P/I:P/A:P\", \"baseScore\": 6.0, \"accessVector\": \"NETWORK\", \"accessComplexity\": \"MEDIUM\", \"authentication\": \"SINGLE\", \"confidentialityImpact\": \"PARTIAL\", \"integrityImpact\": \"PARTIAL\", \"availabilityImpact\": \"PARTIAL\"}, \"baseSeverity\": \"MEDIUM\", \"exploitabilityScore\": 6.8, \"impactScore\": 6.4, \"acInsufInfo\": false, \"obtainAllPrivilege\": false, \"obtainUserPrivilege\": false, \"obtainOtherPrivilege\": false, \"userInteractionRequired\": false}]}", "published": "2019-04-08T20:29:10.003", "references": "[{\"url\": \"http://www.openwall.com/lists/oss-security/2019/04/02/4\", \"source\": \"security@apache.org\", \"tags\": [\"Mailing List\", \"Mitigation\", \"Third Party Advisory\"]}, {\"url\": \"http://www.securityfocus.com/bid/107667\", \"source\": \"security@apache.org\", \"tags\": [\"Third Party Advisory\", \"VDB Entry\"]}, {\"url\": \"https://access.redhat.com/errata/RHSA-2019:0980\", \"source\": \"security@apache.org\"}, {\"url\": \"https://httpd.apache.org/security/vulnerabilities_24.html\", \"source\": \"security@apache.org\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"https://lists.apache.org/thread.html/117bc3f09847ebf020b1bb70301ebcc105ddc446856150b63f37f8eb%40%3Cdev.httpd.apache.org%3E\", \"source\": \"security@apache.org\"}, {\"url\": \"https://lists.apache.org/thread.html/2d6bd429a0ba9af1580da896575cfca6e42bb05e7536562d4b095fcf%40%3Ccvs.httpd.apache.org%3E\", \"source\": \"security@apache.org\"}, {\"url\": \"https://lists.apache.org/thread.html/56c2e7cc9deb1c12a843d0dc251ea7fd3e7e80293cde02fcd65286ba%40%3Ccvs.httpd.apache.org%3E\", \"source\": \"security@apache.org\"}, {\"url\": \"https://lists.apache.org/thread.html/5b1e7d66c5adf286f14f6cc0f857b6fca107444f68aed9e70eedab47%40%3Cdev.httpd.apache.org%3E\", \"source\": \"security@apache.org\"}, {\"url\": \"https://lists.apache.org/thread.html/84a3714f0878781f6ed84473d1a503d2cc382277e100450209231830%40%3Ccvs.httpd.apache.org%3E\", \"source\": \"security@apache.org\"}, {\"url\": \"https://lists.apache.org/thread.html/bc1a6d4137798565ab02e60079b6788442147f4efeb4200c665bed5b%40%3Ccvs.httpd.apache.org%3E\", \"source\": \"security@apache.org\"}, {\"url\": \"https://lists.apache.org/thread.html/r03ee478b3dda3e381fd6189366fa7af97c980d2f602846eef935277d%40%3Ccvs.httpd.apache.org%3E\", \"source\": \"security@apache.org\"}, {\"url\": \"https://lists.apache.org/thread.html/r06f0d87ebb6d59ed8379633f36f72f5b1f79cadfda72ede0830b42cf%40%3Ccvs.httpd.apache.org%3E\", \"source\": \"security@apache.org\"}, {\"url\": \"https://lists.apache.org/thread.html/r76142b8c5119df2178be7c2dba88fde552eedeec37ea993dfce68d1d%40%3Ccvs.httpd.apache.org%3E\", \"source\": \"security@apache.org\"}, {\"url\": \"https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E\", \"source\": \"security@apache.org\"}, {\"url\": \"https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a%40%3Ccvs.httpd.apache.org%3E\", \"source\": \"security@apache.org\"}, {\"url\": \"https://lists.apache.org/thread.html/rd18c3c43602e66f9cdcf09f1de233804975b9572b0456cc582390b6f%40%3Ccvs.httpd.apache.org%3E\", \"source\": \"security@apache.org\"}, {\"url\": \"https://lists.apache.org/thread.html/rd2fb621142e7fa187cfe12d7137bf66e7234abcbbcd800074c84a538%40%3Ccvs.httpd.apache.org%3E\", \"source\": \"security@apache.org\"}, {\"url\": \"https://lists.apache.org/thread.html/re3d27b6250aa8548b8845d314bb8a350b3df326cacbbfdfe4d455234%40%3Ccvs.httpd.apache.org%3E\", \"source\": \"security@apache.org\"}, {\"url\": \"https://lists.apache.org/thread.html/re473305a65b4db888e3556e4dae10c2a04ee89dcff2e26ecdbd860a9%40%3Ccvs.httpd.apache.org%3E\", \"source\": \"security@apache.org\"}, {\"url\": \"https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E\", \"source\": \"security@apache.org\"}, {\"url\": \"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ALIR5S3O7NRHEGFMIDMUSYQIZOE4TJJN/\", \"source\": \"security@apache.org\"}, {\"url\": \"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EZRMTEIGZKYFNGIDOTXN3GNEJTLVCYU7/\", \"source\": \"security@apache.org\"}, {\"url\": \"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WETXNQWNQLWHV6XNW6YTO5UGDTIWAQGT/\", \"source\": \"security@apache.org\"}, {\"url\": \"https://security.netapp.com/advisory/ntap-20190423-0001/\", \"source\": \"security@apache.org\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://support.f5.com/csp/article/K59440504\", \"source\": \"security@apache.org\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://www.oracle.com/security-alerts/cpuapr2020.html\", \"source\": \"security@apache.org\"}, {\"url\": \"https://www.oracle.com/security-alerts/cpujan2020.html\", \"source\": \"security@apache.org\"}, {\"url\": \"https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html\", \"source\": \"security@apache.org\"}, {\"url\": \"https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html\", \"source\": \"security@apache.org\"}, {\"url\": \"http://www.openwall.com/lists/oss-security/2019/04/02/4\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Mailing List\", \"Mitigation\", \"Third Party Advisory\"]}, {\"url\": \"http://www.securityfocus.com/bid/107667\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\", \"VDB Entry\"]}, {\"url\": \"https://access.redhat.com/errata/RHSA-2019:0980\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://httpd.apache.org/security/vulnerabilities_24.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"https://lists.apache.org/thread.html/117bc3f09847ebf020b1bb70301ebcc105ddc446856150b63f37f8eb%40%3Cdev.httpd.apache.org%3E\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://lists.apache.org/thread.html/2d6bd429a0ba9af1580da896575cfca6e42bb05e7536562d4b095fcf%40%3Ccvs.httpd.apache.org%3E\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://lists.apache.org/thread.html/56c2e7cc9deb1c12a843d0dc251ea7fd3e7e80293cde02fcd65286ba%40%3Ccvs.httpd.apache.org%3E\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://lists.apache.org/thread.html/5b1e7d66c5adf286f14f6cc0f857b6fca107444f68aed9e70eedab47%40%3Cdev.httpd.apache.org%3E\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://lists.apache.org/thread.html/84a3714f0878781f6ed84473d1a503d2cc382277e100450209231830%40%3Ccvs.httpd.apache.org%3E\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://lists.apache.org/thread.html/bc1a6d4137798565ab02e60079b6788442147f4efeb4200c665bed5b%40%3Ccvs.httpd.apache.org%3E\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://lists.apache.org/thread.html/r03ee478b3dda3e381fd6189366fa7af97c980d2f602846eef935277d%40%3Ccvs.httpd.apache.org%3E\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://lists.apache.org/thread.html/r06f0d87ebb6d59ed8379633f36f72f5b1f79cadfda72ede0830b42cf%40%3Ccvs.httpd.apache.org%3E\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://lists.apache.org/thread.html/r76142b8c5119df2178be7c2dba88fde552eedeec37ea993dfce68d1d%40%3Ccvs.httpd.apache.org%3E\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a%40%3Ccvs.httpd.apache.org%3E\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://lists.apache.org/thread.html/rd18c3c43602e66f9cdcf09f1de233804975b9572b0456cc582390b6f%40%3Ccvs.httpd.apache.org%3E\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://lists.apache.org/thread.html/rd2fb621142e7fa187cfe12d7137bf66e7234abcbbcd800074c84a538%40%3Ccvs.httpd.apache.org%3E\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://lists.apache.org/thread.html/re3d27b6250aa8548b8845d314bb8a350b3df326cacbbfdfe4d455234%40%3Ccvs.httpd.apache.org%3E\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://lists.apache.org/thread.html/re473305a65b4db888e3556e4dae10c2a04ee89dcff2e26ecdbd860a9%40%3Ccvs.httpd.apache.org%3E\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ALIR5S3O7NRHEGFMIDMUSYQIZOE4TJJN/\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EZRMTEIGZKYFNGIDOTXN3GNEJTLVCYU7/\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WETXNQWNQLWHV6XNW6YTO5UGDTIWAQGT/\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://security.netapp.com/advisory/ntap-20190423-0001/\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://support.f5.com/csp/article/K59440504\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://www.oracle.com/security-alerts/cpuapr2020.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://www.oracle.com/security-alerts/cpujan2020.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}]", "sourceIdentifier": "security@apache.org", "vulnStatus": "Modified", "weaknesses": "[{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"NVD-CWE-noinfo\"}]}]" }, "nvd": "{\"cve\":{\"id\":\"CVE-2019-0215\",\"sourceIdentifier\":\"security@apache.org\",\"published\":\"2019-04-08T20:29:10.003\",\"lastModified\":\"2024-11-21T04:16:30.333\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"In Apache HTTP Server 2.4 releases 2.4.37 and 2.4.38, a bug in mod_ssl when using per-location client certificate verification with TLSv1.3 allowed a client to bypass configured access control restrictions.\"},{\"lang\":\"es\",\"value\":\"En Apache HTTP Server 2.4, versiones 2.4.37 y 2.4.38, un error en mod_ssl al utilizar la verificaci\u00f3n de certificados de cliente por ubicaci\u00f3n con TLSv1.3 permit\u00eda a un cliente eludir las restricciones de control de acceso configuradas.\"}],\"metrics\":{\"cvssMetricV30\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.0\",\"vectorString\":\"CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H\",\"baseScore\":7.5,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"HIGH\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":1.6,\"impactScore\":5.9}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:M/Au:S/C:P/I:P/A:P\",\"baseScore\":6.0,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"MEDIUM\",\"authentication\":\"SINGLE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"PARTIAL\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":6.8,\"impactScore\":6.4,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"NVD-CWE-noinfo\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:http_server:2.4.37:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DE5F8320-A680-4E2F-B32F-F7DBEED09ED6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:http_server:2.4.38:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"033F6E44-5230-4D11-883C-591D7FC21F36\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:fedoraproject:fedora:29:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D100F7CE-FC64-4CC6-852A-6136D72DA419\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"97A4B8DF-58DA-4AB6-A1F9-331B36409BA3\"}]}]}],\"references\":[{\"url\":\"http://www.openwall.com/lists/oss-security/2019/04/02/4\",\"source\":\"security@apache.org\",\"tags\":[\"Mailing List\",\"Mitigation\",\"Third Party Advisory\"]},{\"url\":\"http://www.securityfocus.com/bid/107667\",\"source\":\"security@apache.org\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2019:0980\",\"source\":\"security@apache.org\"},{\"url\":\"https://httpd.apache.org/security/vulnerabilities_24.html\",\"source\":\"security@apache.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://lists.apache.org/thread.html/117bc3f09847ebf020b1bb70301ebcc105ddc446856150b63f37f8eb%40%3Cdev.httpd.apache.org%3E\",\"source\":\"security@apache.org\"},{\"url\":\"https://lists.apache.org/thread.html/2d6bd429a0ba9af1580da896575cfca6e42bb05e7536562d4b095fcf%40%3Ccvs.httpd.apache.org%3E\",\"source\":\"security@apache.org\"},{\"url\":\"https://lists.apache.org/thread.html/56c2e7cc9deb1c12a843d0dc251ea7fd3e7e80293cde02fcd65286ba%40%3Ccvs.httpd.apache.org%3E\",\"source\":\"security@apache.org\"},{\"url\":\"https://lists.apache.org/thread.html/5b1e7d66c5adf286f14f6cc0f857b6fca107444f68aed9e70eedab47%40%3Cdev.httpd.apache.org%3E\",\"source\":\"security@apache.org\"},{\"url\":\"https://lists.apache.org/thread.html/84a3714f0878781f6ed84473d1a503d2cc382277e100450209231830%40%3Ccvs.httpd.apache.org%3E\",\"source\":\"security@apache.org\"},{\"url\":\"https://lists.apache.org/thread.html/bc1a6d4137798565ab02e60079b6788442147f4efeb4200c665bed5b%40%3Ccvs.httpd.apache.org%3E\",\"source\":\"security@apache.org\"},{\"url\":\"https://lists.apache.org/thread.html/r03ee478b3dda3e381fd6189366fa7af97c980d2f602846eef935277d%40%3Ccvs.httpd.apache.org%3E\",\"source\":\"security@apache.org\"},{\"url\":\"https://lists.apache.org/thread.html/r06f0d87ebb6d59ed8379633f36f72f5b1f79cadfda72ede0830b42cf%40%3Ccvs.httpd.apache.org%3E\",\"source\":\"security@apache.org\"},{\"url\":\"https://lists.apache.org/thread.html/r76142b8c5119df2178be7c2dba88fde552eedeec37ea993dfce68d1d%40%3Ccvs.httpd.apache.org%3E\",\"source\":\"security@apache.org\"},{\"url\":\"https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E\",\"source\":\"security@apache.org\"},{\"url\":\"https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a%40%3Ccvs.httpd.apache.org%3E\",\"source\":\"security@apache.org\"},{\"url\":\"https://lists.apache.org/thread.html/rd18c3c43602e66f9cdcf09f1de233804975b9572b0456cc582390b6f%40%3Ccvs.httpd.apache.org%3E\",\"source\":\"security@apache.org\"},{\"url\":\"https://lists.apache.org/thread.html/rd2fb621142e7fa187cfe12d7137bf66e7234abcbbcd800074c84a538%40%3Ccvs.httpd.apache.org%3E\",\"source\":\"security@apache.org\"},{\"url\":\"https://lists.apache.org/thread.html/re3d27b6250aa8548b8845d314bb8a350b3df326cacbbfdfe4d455234%40%3Ccvs.httpd.apache.org%3E\",\"source\":\"security@apache.org\"},{\"url\":\"https://lists.apache.org/thread.html/re473305a65b4db888e3556e4dae10c2a04ee89dcff2e26ecdbd860a9%40%3Ccvs.httpd.apache.org%3E\",\"source\":\"security@apache.org\"},{\"url\":\"https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E\",\"source\":\"security@apache.org\"},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ALIR5S3O7NRHEGFMIDMUSYQIZOE4TJJN/\",\"source\":\"security@apache.org\"},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EZRMTEIGZKYFNGIDOTXN3GNEJTLVCYU7/\",\"source\":\"security@apache.org\"},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WETXNQWNQLWHV6XNW6YTO5UGDTIWAQGT/\",\"source\":\"security@apache.org\"},{\"url\":\"https://security.netapp.com/advisory/ntap-20190423-0001/\",\"source\":\"security@apache.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://support.f5.com/csp/article/K59440504\",\"source\":\"security@apache.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.oracle.com/security-alerts/cpuapr2020.html\",\"source\":\"security@apache.org\"},{\"url\":\"https://www.oracle.com/security-alerts/cpujan2020.html\",\"source\":\"security@apache.org\"},{\"url\":\"https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html\",\"source\":\"security@apache.org\"},{\"url\":\"https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html\",\"source\":\"security@apache.org\"},{\"url\":\"http://www.openwall.com/lists/oss-security/2019/04/02/4\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Mitigation\",\"Third Party Advisory\"]},{\"url\":\"http://www.securityfocus.com/bid/107667\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2019:0980\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://httpd.apache.org/security/vulnerabilities_24.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://lists.apache.org/thread.html/117bc3f09847ebf020b1bb70301ebcc105ddc446856150b63f37f8eb%40%3Cdev.httpd.apache.org%3E\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://lists.apache.org/thread.html/2d6bd429a0ba9af1580da896575cfca6e42bb05e7536562d4b095fcf%40%3Ccvs.httpd.apache.org%3E\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://lists.apache.org/thread.html/56c2e7cc9deb1c12a843d0dc251ea7fd3e7e80293cde02fcd65286ba%40%3Ccvs.httpd.apache.org%3E\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://lists.apache.org/thread.html/5b1e7d66c5adf286f14f6cc0f857b6fca107444f68aed9e70eedab47%40%3Cdev.httpd.apache.org%3E\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://lists.apache.org/thread.html/84a3714f0878781f6ed84473d1a503d2cc382277e100450209231830%40%3Ccvs.httpd.apache.org%3E\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://lists.apache.org/thread.html/bc1a6d4137798565ab02e60079b6788442147f4efeb4200c665bed5b%40%3Ccvs.httpd.apache.org%3E\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://lists.apache.org/thread.html/r03ee478b3dda3e381fd6189366fa7af97c980d2f602846eef935277d%40%3Ccvs.httpd.apache.org%3E\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://lists.apache.org/thread.html/r06f0d87ebb6d59ed8379633f36f72f5b1f79cadfda72ede0830b42cf%40%3Ccvs.httpd.apache.org%3E\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://lists.apache.org/thread.html/r76142b8c5119df2178be7c2dba88fde552eedeec37ea993dfce68d1d%40%3Ccvs.httpd.apache.org%3E\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a%40%3Ccvs.httpd.apache.org%3E\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://lists.apache.org/thread.html/rd18c3c43602e66f9cdcf09f1de233804975b9572b0456cc582390b6f%40%3Ccvs.httpd.apache.org%3E\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://lists.apache.org/thread.html/rd2fb621142e7fa187cfe12d7137bf66e7234abcbbcd800074c84a538%40%3Ccvs.httpd.apache.org%3E\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://lists.apache.org/thread.html/re3d27b6250aa8548b8845d314bb8a350b3df326cacbbfdfe4d455234%40%3Ccvs.httpd.apache.org%3E\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://lists.apache.org/thread.html/re473305a65b4db888e3556e4dae10c2a04ee89dcff2e26ecdbd860a9%40%3Ccvs.httpd.apache.org%3E\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ALIR5S3O7NRHEGFMIDMUSYQIZOE4TJJN/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EZRMTEIGZKYFNGIDOTXN3GNEJTLVCYU7/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WETXNQWNQLWHV6XNW6YTO5UGDTIWAQGT/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://security.netapp.com/advisory/ntap-20190423-0001/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://support.f5.com/csp/article/K59440504\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.oracle.com/security-alerts/cpuapr2020.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://www.oracle.com/security-alerts/cpujan2020.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}]}}" } }
ghsa-xpmg-8256-c52g
Vulnerability from github
Published
2022-05-13 01:09
Modified
2022-05-13 01:09
Severity ?
Details
In Apache HTTP Server 2.4 releases 2.4.37 and 2.4.38, a bug in mod_ssl when using per-location client certificate verification with TLSv1.3 allowed a client to bypass configured access control restrictions.
{ "affected": [], "aliases": [ "CVE-2019-0215" ], "database_specific": { "cwe_ids": [], "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2019-04-08T20:29:00Z", "severity": "HIGH" }, "details": "In Apache HTTP Server 2.4 releases 2.4.37 and 2.4.38, a bug in mod_ssl when using per-location client certificate verification with TLSv1.3 allowed a client to bypass configured access control restrictions.", "id": "GHSA-xpmg-8256-c52g", "modified": "2022-05-13T01:09:38Z", "published": "2022-05-13T01:09:38Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-0215" }, { "type": "WEB", "url": "https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html" }, { "type": "WEB", "url": "https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html" }, { "type": "WEB", "url": "https://www.oracle.com/security-alerts/cpujan2020.html" }, { "type": "WEB", "url": "https://www.oracle.com/security-alerts/cpuapr2020.html" }, { "type": "WEB", "url": "https://support.f5.com/csp/article/K59440504" }, { "type": "WEB", "url": "https://security.netapp.com/advisory/ntap-20190423-0001" }, { "type": "WEB", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WETXNQWNQLWHV6XNW6YTO5UGDTIWAQGT" }, { "type": "WEB", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EZRMTEIGZKYFNGIDOTXN3GNEJTLVCYU7" }, { "type": "WEB", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ALIR5S3O7NRHEGFMIDMUSYQIZOE4TJJN" }, { "type": "WEB", "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E" }, { "type": "WEB", "url": "https://lists.apache.org/thread.html/re473305a65b4db888e3556e4dae10c2a04ee89dcff2e26ecdbd860a9@%3Ccvs.httpd.apache.org%3E" }, { "type": "WEB", "url": "https://lists.apache.org/thread.html/re3d27b6250aa8548b8845d314bb8a350b3df326cacbbfdfe4d455234@%3Ccvs.httpd.apache.org%3E" }, { "type": "WEB", "url": "https://lists.apache.org/thread.html/rd2fb621142e7fa187cfe12d7137bf66e7234abcbbcd800074c84a538@%3Ccvs.httpd.apache.org%3E" }, { "type": "WEB", "url": "https://lists.apache.org/thread.html/rd18c3c43602e66f9cdcf09f1de233804975b9572b0456cc582390b6f@%3Ccvs.httpd.apache.org%3E" }, { "type": "WEB", "url": "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E" }, { "type": "WEB", "url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E" }, { "type": "WEB", "url": "https://lists.apache.org/thread.html/r76142b8c5119df2178be7c2dba88fde552eedeec37ea993dfce68d1d@%3Ccvs.httpd.apache.org%3E" }, { "type": "WEB", "url": "https://lists.apache.org/thread.html/r06f0d87ebb6d59ed8379633f36f72f5b1f79cadfda72ede0830b42cf@%3Ccvs.httpd.apache.org%3E" }, { "type": "WEB", "url": "https://lists.apache.org/thread.html/r03ee478b3dda3e381fd6189366fa7af97c980d2f602846eef935277d@%3Ccvs.httpd.apache.org%3E" }, { "type": "WEB", "url": "https://lists.apache.org/thread.html/bc1a6d4137798565ab02e60079b6788442147f4efeb4200c665bed5b@%3Ccvs.httpd.apache.org%3E" }, { "type": "WEB", "url": "https://lists.apache.org/thread.html/84a3714f0878781f6ed84473d1a503d2cc382277e100450209231830@%3Ccvs.httpd.apache.org%3E" }, { "type": "WEB", "url": "https://lists.apache.org/thread.html/5b1e7d66c5adf286f14f6cc0f857b6fca107444f68aed9e70eedab47@%3Cdev.httpd.apache.org%3E" }, { "type": "WEB", "url": "https://lists.apache.org/thread.html/56c2e7cc9deb1c12a843d0dc251ea7fd3e7e80293cde02fcd65286ba@%3Ccvs.httpd.apache.org%3E" }, { "type": "WEB", "url": "https://lists.apache.org/thread.html/2d6bd429a0ba9af1580da896575cfca6e42bb05e7536562d4b095fcf@%3Ccvs.httpd.apache.org%3E" }, { "type": "WEB", "url": "https://lists.apache.org/thread.html/117bc3f09847ebf020b1bb70301ebcc105ddc446856150b63f37f8eb@%3Cdev.httpd.apache.org%3E" }, { "type": "WEB", "url": "https://httpd.apache.org/security/vulnerabilities_24.html" }, { "type": "WEB", "url": "https://access.redhat.com/errata/RHSA-2019:0980" }, { "type": "WEB", "url": "http://www.openwall.com/lists/oss-security/2019/04/02/4" }, { "type": "WEB", "url": "http://www.securityfocus.com/bid/107667" } ], "schema_version": "1.4.0", "severity": [ { "score": "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "type": "CVSS_V3" } ] }
cve-2019-0215
Vulnerability from fkie_nvd
Published
2019-04-08 20:29
Modified
2024-11-21 04:16
Severity ?
Summary
In Apache HTTP Server 2.4 releases 2.4.37 and 2.4.38, a bug in mod_ssl when using per-location client certificate verification with TLSv1.3 allowed a client to bypass configured access control restrictions.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
apache | http_server | 2.4.37 | |
apache | http_server | 2.4.38 | |
fedoraproject | fedora | 29 | |
fedoraproject | fedora | 30 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:apache:http_server:2.4.37:*:*:*:*:*:*:*", "matchCriteriaId": "DE5F8320-A680-4E2F-B32F-F7DBEED09ED6", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:http_server:2.4.38:*:*:*:*:*:*:*", "matchCriteriaId": "033F6E44-5230-4D11-883C-591D7FC21F36", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:fedoraproject:fedora:29:*:*:*:*:*:*:*", "matchCriteriaId": "D100F7CE-FC64-4CC6-852A-6136D72DA419", "vulnerable": true }, { "criteria": "cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*", "matchCriteriaId": "97A4B8DF-58DA-4AB6-A1F9-331B36409BA3", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "In Apache HTTP Server 2.4 releases 2.4.37 and 2.4.38, a bug in mod_ssl when using per-location client certificate verification with TLSv1.3 allowed a client to bypass configured access control restrictions." }, { "lang": "es", "value": "En Apache HTTP Server 2.4, versiones 2.4.37 y 2.4.38, un error en mod_ssl al utilizar la verificaci\u00f3n de certificados de cliente por ubicaci\u00f3n con TLSv1.3 permit\u00eda a un cliente eludir las restricciones de control de acceso configuradas." } ], "id": "CVE-2019-0215", "lastModified": "2024-11-21T04:16:30.333", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:S/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 6.8, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "exploitabilityScore": 1.6, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2019-04-08T20:29:10.003", "references": [ { "source": "security@apache.org", "tags": [ "Mailing List", "Mitigation", "Third Party Advisory" ], "url": "http://www.openwall.com/lists/oss-security/2019/04/02/4" }, { "source": "security@apache.org", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/107667" }, { "source": "security@apache.org", "url": "https://access.redhat.com/errata/RHSA-2019:0980" }, { "source": "security@apache.org", "tags": [ "Vendor Advisory" ], "url": "https://httpd.apache.org/security/vulnerabilities_24.html" }, { "source": "security@apache.org", "url": "https://lists.apache.org/thread.html/117bc3f09847ebf020b1bb70301ebcc105ddc446856150b63f37f8eb%40%3Cdev.httpd.apache.org%3E" }, { "source": "security@apache.org", "url": "https://lists.apache.org/thread.html/2d6bd429a0ba9af1580da896575cfca6e42bb05e7536562d4b095fcf%40%3Ccvs.httpd.apache.org%3E" }, { "source": "security@apache.org", "url": "https://lists.apache.org/thread.html/56c2e7cc9deb1c12a843d0dc251ea7fd3e7e80293cde02fcd65286ba%40%3Ccvs.httpd.apache.org%3E" }, { "source": "security@apache.org", "url": "https://lists.apache.org/thread.html/5b1e7d66c5adf286f14f6cc0f857b6fca107444f68aed9e70eedab47%40%3Cdev.httpd.apache.org%3E" }, { "source": "security@apache.org", "url": "https://lists.apache.org/thread.html/84a3714f0878781f6ed84473d1a503d2cc382277e100450209231830%40%3Ccvs.httpd.apache.org%3E" }, { "source": "security@apache.org", "url": "https://lists.apache.org/thread.html/bc1a6d4137798565ab02e60079b6788442147f4efeb4200c665bed5b%40%3Ccvs.httpd.apache.org%3E" }, { "source": "security@apache.org", "url": "https://lists.apache.org/thread.html/r03ee478b3dda3e381fd6189366fa7af97c980d2f602846eef935277d%40%3Ccvs.httpd.apache.org%3E" }, { "source": "security@apache.org", "url": "https://lists.apache.org/thread.html/r06f0d87ebb6d59ed8379633f36f72f5b1f79cadfda72ede0830b42cf%40%3Ccvs.httpd.apache.org%3E" }, { "source": "security@apache.org", "url": "https://lists.apache.org/thread.html/r76142b8c5119df2178be7c2dba88fde552eedeec37ea993dfce68d1d%40%3Ccvs.httpd.apache.org%3E" }, { "source": "security@apache.org", "url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E" }, { "source": "security@apache.org", "url": "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a%40%3Ccvs.httpd.apache.org%3E" }, { "source": "security@apache.org", "url": "https://lists.apache.org/thread.html/rd18c3c43602e66f9cdcf09f1de233804975b9572b0456cc582390b6f%40%3Ccvs.httpd.apache.org%3E" }, { "source": "security@apache.org", "url": "https://lists.apache.org/thread.html/rd2fb621142e7fa187cfe12d7137bf66e7234abcbbcd800074c84a538%40%3Ccvs.httpd.apache.org%3E" }, { "source": "security@apache.org", "url": "https://lists.apache.org/thread.html/re3d27b6250aa8548b8845d314bb8a350b3df326cacbbfdfe4d455234%40%3Ccvs.httpd.apache.org%3E" }, { "source": "security@apache.org", "url": "https://lists.apache.org/thread.html/re473305a65b4db888e3556e4dae10c2a04ee89dcff2e26ecdbd860a9%40%3Ccvs.httpd.apache.org%3E" }, { "source": "security@apache.org", "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E" }, { "source": "security@apache.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ALIR5S3O7NRHEGFMIDMUSYQIZOE4TJJN/" }, { "source": "security@apache.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EZRMTEIGZKYFNGIDOTXN3GNEJTLVCYU7/" }, { "source": "security@apache.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WETXNQWNQLWHV6XNW6YTO5UGDTIWAQGT/" }, { "source": "security@apache.org", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20190423-0001/" }, { "source": "security@apache.org", "tags": [ "Third Party Advisory" ], "url": "https://support.f5.com/csp/article/K59440504" }, { "source": "security@apache.org", "url": "https://www.oracle.com/security-alerts/cpuapr2020.html" }, { "source": "security@apache.org", "url": "https://www.oracle.com/security-alerts/cpujan2020.html" }, { "source": "security@apache.org", "url": "https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html" }, { "source": "security@apache.org", "url": "https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Mitigation", "Third Party Advisory" ], "url": "http://www.openwall.com/lists/oss-security/2019/04/02/4" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/107667" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://access.redhat.com/errata/RHSA-2019:0980" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://httpd.apache.org/security/vulnerabilities_24.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.apache.org/thread.html/117bc3f09847ebf020b1bb70301ebcc105ddc446856150b63f37f8eb%40%3Cdev.httpd.apache.org%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.apache.org/thread.html/2d6bd429a0ba9af1580da896575cfca6e42bb05e7536562d4b095fcf%40%3Ccvs.httpd.apache.org%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.apache.org/thread.html/56c2e7cc9deb1c12a843d0dc251ea7fd3e7e80293cde02fcd65286ba%40%3Ccvs.httpd.apache.org%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.apache.org/thread.html/5b1e7d66c5adf286f14f6cc0f857b6fca107444f68aed9e70eedab47%40%3Cdev.httpd.apache.org%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.apache.org/thread.html/84a3714f0878781f6ed84473d1a503d2cc382277e100450209231830%40%3Ccvs.httpd.apache.org%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.apache.org/thread.html/bc1a6d4137798565ab02e60079b6788442147f4efeb4200c665bed5b%40%3Ccvs.httpd.apache.org%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.apache.org/thread.html/r03ee478b3dda3e381fd6189366fa7af97c980d2f602846eef935277d%40%3Ccvs.httpd.apache.org%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.apache.org/thread.html/r06f0d87ebb6d59ed8379633f36f72f5b1f79cadfda72ede0830b42cf%40%3Ccvs.httpd.apache.org%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.apache.org/thread.html/r76142b8c5119df2178be7c2dba88fde552eedeec37ea993dfce68d1d%40%3Ccvs.httpd.apache.org%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a%40%3Ccvs.httpd.apache.org%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.apache.org/thread.html/rd18c3c43602e66f9cdcf09f1de233804975b9572b0456cc582390b6f%40%3Ccvs.httpd.apache.org%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.apache.org/thread.html/rd2fb621142e7fa187cfe12d7137bf66e7234abcbbcd800074c84a538%40%3Ccvs.httpd.apache.org%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.apache.org/thread.html/re3d27b6250aa8548b8845d314bb8a350b3df326cacbbfdfe4d455234%40%3Ccvs.httpd.apache.org%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.apache.org/thread.html/re473305a65b4db888e3556e4dae10c2a04ee89dcff2e26ecdbd860a9%40%3Ccvs.httpd.apache.org%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ALIR5S3O7NRHEGFMIDMUSYQIZOE4TJJN/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EZRMTEIGZKYFNGIDOTXN3GNEJTLVCYU7/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WETXNQWNQLWHV6XNW6YTO5UGDTIWAQGT/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20190423-0001/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://support.f5.com/csp/article/K59440504" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://www.oracle.com/security-alerts/cpuapr2020.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://www.oracle.com/security-alerts/cpujan2020.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html" } ], "sourceIdentifier": "security@apache.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
rhsa-2019:0980
Vulnerability from csaf_redhat
Published
2019-05-07 04:19
Modified
2024-11-22 12:56
Summary
Red Hat Security Advisory: httpd:2.4 security update
Notes
Topic
An update for the httpd:2.4 module is now available for Red Hat Enterprise Linux 8.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
The httpd packages provide the Apache HTTP Server, a powerful, efficient, and extensible web server.
Security Fix(es):
* httpd: privilege escalation from modules scripts (CVE-2019-0211)
* httpd: mod_ssl: access control bypass when using per-location client certification authentication (CVE-2019-0215)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for the httpd:2.4 module is now available for Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "The httpd packages provide the Apache HTTP Server, a powerful, efficient, and extensible web server.\n\nSecurity Fix(es):\n\n* httpd: privilege escalation from modules scripts (CVE-2019-0211)\n\n* httpd: mod_ssl: access control bypass when using per-location client certification authentication (CVE-2019-0215)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2019:0980", "url": "https://access.redhat.com/errata/RHSA-2019:0980" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "1694980", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1694980" }, { "category": "external", "summary": "1695025", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1695025" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2019/rhsa-2019_0980.json" } ], "title": "Red Hat Security Advisory: httpd:2.4 security update", "tracking": { "current_release_date": "2024-11-22T12:56:59+00:00", "generator": { "date": "2024-11-22T12:56:59+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2019:0980", "initial_release_date": "2019-05-07T04:19:52+00:00", "revision_history": [ { "date": "2019-05-07T04:19:52+00:00", "number": "1", "summary": "Initial version" }, { "date": "2019-05-07T04:19:52+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-22T12:56:59+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux AppStream (v. 8)", "product": { "name": "Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z", "product_identification_helper": { "cpe": "cpe:/a:redhat:enterprise_linux:8::appstream" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "httpd:2.4:8000020190405071959:55190bc5", "product": { "name": "httpd:2.4:8000020190405071959:55190bc5", "product_id": "httpd:2.4:8000020190405071959:55190bc5", "product_identification_helper": { "purl": "pkg:rpmmod/redhat/httpd@2.4:8000020190405071959:55190bc5" } } }, { "category": "product_version", "name": "httpd-filesystem-0:2.4.37-11.module+el8.0.0+2969+90015743.noarch", "product": { "name": "httpd-filesystem-0:2.4.37-11.module+el8.0.0+2969+90015743.noarch", "product_id": "httpd-filesystem-0:2.4.37-11.module+el8.0.0+2969+90015743.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-filesystem@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=noarch" } } }, { "category": "product_version", "name": "httpd-manual-0:2.4.37-11.module+el8.0.0+2969+90015743.noarch", "product": { "name": "httpd-manual-0:2.4.37-11.module+el8.0.0+2969+90015743.noarch", "product_id": "httpd-manual-0:2.4.37-11.module+el8.0.0+2969+90015743.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-manual@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=noarch" } } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "httpd-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "product": { "name": "httpd-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "product_id": "httpd-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=s390x" } } }, { "category": "product_version", "name": "httpd-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "product": { "name": "httpd-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "product_id": "httpd-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-debuginfo@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=s390x" } } }, { "category": "product_version", "name": "httpd-debugsource-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "product": { "name": "httpd-debugsource-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "product_id": "httpd-debugsource-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-debugsource@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=s390x" } } }, { "category": "product_version", "name": "httpd-devel-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "product": { "name": "httpd-devel-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "product_id": "httpd-devel-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-devel@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=s390x" } } }, { "category": "product_version", "name": "httpd-tools-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "product": { "name": "httpd-tools-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "product_id": "httpd-tools-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-tools@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=s390x" } } }, { "category": "product_version", "name": "httpd-tools-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "product": { "name": "httpd-tools-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "product_id": "httpd-tools-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-tools-debuginfo@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=s390x" } } }, { "category": "product_version", "name": "mod_http2-0:1.11.3-2.module+el8.0.0+2969+90015743.s390x", "product": { "name": "mod_http2-0:1.11.3-2.module+el8.0.0+2969+90015743.s390x", "product_id": "mod_http2-0:1.11.3-2.module+el8.0.0+2969+90015743.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_http2@1.11.3-2.module%2Bel8.0.0%2B2969%2B90015743?arch=s390x" } } }, { "category": "product_version", "name": "mod_http2-debuginfo-0:1.11.3-2.module+el8.0.0+2969+90015743.s390x", "product": { "name": "mod_http2-debuginfo-0:1.11.3-2.module+el8.0.0+2969+90015743.s390x", "product_id": "mod_http2-debuginfo-0:1.11.3-2.module+el8.0.0+2969+90015743.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_http2-debuginfo@1.11.3-2.module%2Bel8.0.0%2B2969%2B90015743?arch=s390x" } } }, { "category": "product_version", "name": "mod_http2-debugsource-0:1.11.3-2.module+el8.0.0+2969+90015743.s390x", "product": { "name": "mod_http2-debugsource-0:1.11.3-2.module+el8.0.0+2969+90015743.s390x", "product_id": "mod_http2-debugsource-0:1.11.3-2.module+el8.0.0+2969+90015743.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_http2-debugsource@1.11.3-2.module%2Bel8.0.0%2B2969%2B90015743?arch=s390x" } } }, { "category": "product_version", "name": "mod_ldap-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "product": { "name": "mod_ldap-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "product_id": "mod_ldap-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ldap@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=s390x" } } }, { "category": "product_version", "name": "mod_ldap-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "product": { "name": "mod_ldap-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "product_id": "mod_ldap-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ldap-debuginfo@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=s390x" } } }, { "category": "product_version", "name": "mod_md-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "product": { "name": "mod_md-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "product_id": "mod_md-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_md@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=s390x" } } }, { "category": "product_version", "name": "mod_md-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "product": { "name": "mod_md-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "product_id": "mod_md-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_md-debuginfo@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=s390x" } } }, { "category": "product_version", "name": "mod_proxy_html-1:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "product": { "name": "mod_proxy_html-1:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "product_id": "mod_proxy_html-1:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_proxy_html@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_proxy_html-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "product": { "name": "mod_proxy_html-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "product_id": "mod_proxy_html-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_proxy_html-debuginfo@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_session-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "product": { "name": "mod_session-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "product_id": "mod_session-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_session@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=s390x" } } }, { "category": "product_version", "name": "mod_session-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "product": { "name": "mod_session-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "product_id": "mod_session-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_session-debuginfo@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=s390x" } } }, { "category": "product_version", "name": "mod_ssl-1:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "product": { "name": "mod_ssl-1:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "product_id": "mod_ssl-1:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ssl@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_ssl-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "product": { "name": "mod_ssl-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "product_id": "mod_ssl-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ssl-debuginfo@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=s390x\u0026epoch=1" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "httpd-0:2.4.37-11.module+el8.0.0+2969+90015743.src", "product": { "name": "httpd-0:2.4.37-11.module+el8.0.0+2969+90015743.src", "product_id": "httpd-0:2.4.37-11.module+el8.0.0+2969+90015743.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=src" } } }, { "category": "product_version", "name": "mod_http2-0:1.11.3-2.module+el8.0.0+2969+90015743.src", "product": { "name": "mod_http2-0:1.11.3-2.module+el8.0.0+2969+90015743.src", "product_id": "mod_http2-0:1.11.3-2.module+el8.0.0+2969+90015743.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_http2@1.11.3-2.module%2Bel8.0.0%2B2969%2B90015743?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "httpd-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "product": { "name": "httpd-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "product_id": "httpd-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=aarch64" } } }, { "category": "product_version", "name": "httpd-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "product": { "name": "httpd-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "product_id": "httpd-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-debuginfo@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=aarch64" } } }, { "category": "product_version", "name": "httpd-debugsource-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "product": { "name": "httpd-debugsource-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "product_id": "httpd-debugsource-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-debugsource@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=aarch64" } } }, { "category": "product_version", "name": "httpd-devel-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "product": { "name": "httpd-devel-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "product_id": "httpd-devel-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-devel@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=aarch64" } } }, { "category": "product_version", "name": "httpd-tools-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "product": { "name": "httpd-tools-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "product_id": "httpd-tools-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-tools@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=aarch64" } } }, { "category": "product_version", "name": "httpd-tools-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "product": { "name": "httpd-tools-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "product_id": "httpd-tools-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-tools-debuginfo@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=aarch64" } } }, { "category": "product_version", "name": "mod_http2-0:1.11.3-2.module+el8.0.0+2969+90015743.aarch64", "product": { "name": "mod_http2-0:1.11.3-2.module+el8.0.0+2969+90015743.aarch64", "product_id": "mod_http2-0:1.11.3-2.module+el8.0.0+2969+90015743.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_http2@1.11.3-2.module%2Bel8.0.0%2B2969%2B90015743?arch=aarch64" } } }, { "category": "product_version", "name": "mod_http2-debuginfo-0:1.11.3-2.module+el8.0.0+2969+90015743.aarch64", "product": { "name": "mod_http2-debuginfo-0:1.11.3-2.module+el8.0.0+2969+90015743.aarch64", "product_id": "mod_http2-debuginfo-0:1.11.3-2.module+el8.0.0+2969+90015743.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_http2-debuginfo@1.11.3-2.module%2Bel8.0.0%2B2969%2B90015743?arch=aarch64" } } }, { "category": "product_version", "name": "mod_http2-debugsource-0:1.11.3-2.module+el8.0.0+2969+90015743.aarch64", "product": { "name": "mod_http2-debugsource-0:1.11.3-2.module+el8.0.0+2969+90015743.aarch64", "product_id": "mod_http2-debugsource-0:1.11.3-2.module+el8.0.0+2969+90015743.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_http2-debugsource@1.11.3-2.module%2Bel8.0.0%2B2969%2B90015743?arch=aarch64" } } }, { "category": "product_version", "name": "mod_ldap-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "product": { "name": "mod_ldap-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "product_id": "mod_ldap-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ldap@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=aarch64" } } }, { "category": "product_version", "name": "mod_ldap-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "product": { "name": "mod_ldap-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "product_id": "mod_ldap-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ldap-debuginfo@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=aarch64" } } }, { "category": "product_version", "name": "mod_md-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "product": { "name": "mod_md-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "product_id": "mod_md-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_md@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=aarch64" } } }, { "category": "product_version", "name": "mod_md-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "product": { "name": "mod_md-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "product_id": "mod_md-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_md-debuginfo@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=aarch64" } } }, { "category": "product_version", "name": "mod_proxy_html-1:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "product": { "name": "mod_proxy_html-1:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "product_id": "mod_proxy_html-1:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_proxy_html@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_proxy_html-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "product": { "name": "mod_proxy_html-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "product_id": "mod_proxy_html-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_proxy_html-debuginfo@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_session-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "product": { "name": "mod_session-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "product_id": "mod_session-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_session@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=aarch64" } } }, { "category": "product_version", "name": "mod_session-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "product": { "name": "mod_session-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "product_id": "mod_session-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_session-debuginfo@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=aarch64" } } }, { "category": "product_version", "name": "mod_ssl-1:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "product": { "name": "mod_ssl-1:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "product_id": "mod_ssl-1:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ssl@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_ssl-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "product": { "name": "mod_ssl-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "product_id": "mod_ssl-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ssl-debuginfo@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=aarch64\u0026epoch=1" } } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "httpd-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "product": { "name": "httpd-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "product_id": "httpd-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=ppc64le" } } }, { "category": "product_version", "name": "httpd-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "product": { "name": "httpd-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "product_id": "httpd-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-debuginfo@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=ppc64le" } } }, { "category": "product_version", "name": "httpd-debugsource-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "product": { "name": "httpd-debugsource-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "product_id": "httpd-debugsource-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-debugsource@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=ppc64le" } } }, { "category": "product_version", "name": "httpd-devel-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "product": { "name": "httpd-devel-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "product_id": "httpd-devel-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-devel@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=ppc64le" } } }, { "category": "product_version", "name": "httpd-tools-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "product": { "name": "httpd-tools-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "product_id": "httpd-tools-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-tools@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=ppc64le" } } }, { "category": "product_version", "name": "httpd-tools-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "product": { "name": "httpd-tools-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "product_id": "httpd-tools-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-tools-debuginfo@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=ppc64le" } } }, { "category": "product_version", "name": "mod_http2-0:1.11.3-2.module+el8.0.0+2969+90015743.ppc64le", "product": { "name": "mod_http2-0:1.11.3-2.module+el8.0.0+2969+90015743.ppc64le", "product_id": "mod_http2-0:1.11.3-2.module+el8.0.0+2969+90015743.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_http2@1.11.3-2.module%2Bel8.0.0%2B2969%2B90015743?arch=ppc64le" } } }, { "category": "product_version", "name": "mod_http2-debuginfo-0:1.11.3-2.module+el8.0.0+2969+90015743.ppc64le", "product": { "name": "mod_http2-debuginfo-0:1.11.3-2.module+el8.0.0+2969+90015743.ppc64le", "product_id": "mod_http2-debuginfo-0:1.11.3-2.module+el8.0.0+2969+90015743.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_http2-debuginfo@1.11.3-2.module%2Bel8.0.0%2B2969%2B90015743?arch=ppc64le" } } }, { "category": "product_version", "name": "mod_http2-debugsource-0:1.11.3-2.module+el8.0.0+2969+90015743.ppc64le", "product": { "name": "mod_http2-debugsource-0:1.11.3-2.module+el8.0.0+2969+90015743.ppc64le", "product_id": "mod_http2-debugsource-0:1.11.3-2.module+el8.0.0+2969+90015743.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_http2-debugsource@1.11.3-2.module%2Bel8.0.0%2B2969%2B90015743?arch=ppc64le" } } }, { "category": "product_version", "name": "mod_ldap-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "product": { "name": "mod_ldap-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "product_id": "mod_ldap-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ldap@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=ppc64le" } } }, { "category": "product_version", "name": "mod_ldap-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "product": { "name": "mod_ldap-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "product_id": "mod_ldap-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ldap-debuginfo@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=ppc64le" } } }, { "category": "product_version", "name": "mod_md-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "product": { "name": "mod_md-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "product_id": "mod_md-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_md@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=ppc64le" } } }, { "category": "product_version", "name": "mod_md-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "product": { "name": "mod_md-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "product_id": "mod_md-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_md-debuginfo@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=ppc64le" } } }, { "category": "product_version", "name": "mod_proxy_html-1:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "product": { "name": "mod_proxy_html-1:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "product_id": "mod_proxy_html-1:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_proxy_html@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_proxy_html-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "product": { "name": "mod_proxy_html-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "product_id": "mod_proxy_html-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_proxy_html-debuginfo@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_session-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "product": { "name": "mod_session-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "product_id": "mod_session-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_session@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=ppc64le" } } }, { "category": "product_version", "name": "mod_session-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "product": { "name": "mod_session-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "product_id": "mod_session-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_session-debuginfo@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=ppc64le" } } }, { "category": "product_version", "name": "mod_ssl-1:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "product": { "name": "mod_ssl-1:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "product_id": "mod_ssl-1:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ssl@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_ssl-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "product": { "name": "mod_ssl-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "product_id": "mod_ssl-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ssl-debuginfo@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=ppc64le\u0026epoch=1" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "httpd-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "product": { "name": "httpd-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "product_id": "httpd-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=x86_64" } } }, { "category": "product_version", "name": "httpd-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "product": { "name": "httpd-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "product_id": "httpd-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-debuginfo@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=x86_64" } } }, { "category": "product_version", "name": "httpd-debugsource-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "product": { "name": "httpd-debugsource-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "product_id": "httpd-debugsource-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-debugsource@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=x86_64" } } }, { "category": "product_version", "name": "httpd-devel-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "product": { "name": "httpd-devel-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "product_id": "httpd-devel-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-devel@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=x86_64" } } }, { "category": "product_version", "name": "httpd-tools-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "product": { "name": "httpd-tools-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "product_id": "httpd-tools-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-tools@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=x86_64" } } }, { "category": "product_version", "name": "httpd-tools-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "product": { "name": "httpd-tools-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "product_id": "httpd-tools-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-tools-debuginfo@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=x86_64" } } }, { "category": "product_version", "name": "mod_http2-0:1.11.3-2.module+el8.0.0+2969+90015743.x86_64", "product": { "name": "mod_http2-0:1.11.3-2.module+el8.0.0+2969+90015743.x86_64", "product_id": "mod_http2-0:1.11.3-2.module+el8.0.0+2969+90015743.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_http2@1.11.3-2.module%2Bel8.0.0%2B2969%2B90015743?arch=x86_64" } } }, { "category": "product_version", "name": "mod_http2-debuginfo-0:1.11.3-2.module+el8.0.0+2969+90015743.x86_64", "product": { "name": "mod_http2-debuginfo-0:1.11.3-2.module+el8.0.0+2969+90015743.x86_64", "product_id": "mod_http2-debuginfo-0:1.11.3-2.module+el8.0.0+2969+90015743.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_http2-debuginfo@1.11.3-2.module%2Bel8.0.0%2B2969%2B90015743?arch=x86_64" } } }, { "category": "product_version", "name": "mod_http2-debugsource-0:1.11.3-2.module+el8.0.0+2969+90015743.x86_64", "product": { "name": "mod_http2-debugsource-0:1.11.3-2.module+el8.0.0+2969+90015743.x86_64", "product_id": "mod_http2-debugsource-0:1.11.3-2.module+el8.0.0+2969+90015743.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_http2-debugsource@1.11.3-2.module%2Bel8.0.0%2B2969%2B90015743?arch=x86_64" } } }, { "category": "product_version", "name": "mod_ldap-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "product": { "name": "mod_ldap-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "product_id": "mod_ldap-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ldap@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=x86_64" } } }, { "category": "product_version", "name": "mod_ldap-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "product": { "name": "mod_ldap-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "product_id": "mod_ldap-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ldap-debuginfo@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=x86_64" } } }, { "category": "product_version", "name": "mod_md-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "product": { "name": "mod_md-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "product_id": "mod_md-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_md@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=x86_64" } } }, { "category": "product_version", "name": "mod_md-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "product": { "name": "mod_md-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "product_id": "mod_md-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_md-debuginfo@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=x86_64" } } }, { "category": "product_version", "name": "mod_proxy_html-1:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "product": { "name": "mod_proxy_html-1:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "product_id": "mod_proxy_html-1:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_proxy_html@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_proxy_html-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "product": { "name": "mod_proxy_html-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "product_id": "mod_proxy_html-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_proxy_html-debuginfo@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_session-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "product": { "name": "mod_session-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "product_id": "mod_session-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_session@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=x86_64" } } }, { "category": "product_version", "name": "mod_session-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "product": { "name": "mod_session-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "product_id": "mod_session-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_session-debuginfo@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=x86_64" } } }, { "category": "product_version", "name": "mod_ssl-1:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "product": { "name": "mod_ssl-1:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "product_id": "mod_ssl-1:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ssl@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_ssl-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "product": { "name": "mod_ssl-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "product_id": "mod_ssl-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ssl-debuginfo@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=x86_64\u0026epoch=1" } } } ], "category": "architecture", "name": "x86_64" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5" }, "product_reference": "httpd:2.4:8000020190405071959:55190bc5", "relates_to_product_reference": "AppStream-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64 as a component of httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64" }, "product_reference": "httpd-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "relates_to_product_reference": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le as a component of httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le" }, "product_reference": "httpd-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "relates_to_product_reference": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x as a component of httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x" }, "product_reference": "httpd-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "relates_to_product_reference": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.37-11.module+el8.0.0+2969+90015743.src as a component of httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-0:2.4.37-11.module+el8.0.0+2969+90015743.src" }, "product_reference": "httpd-0:2.4.37-11.module+el8.0.0+2969+90015743.src", "relates_to_product_reference": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64 as a component of httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64" }, "product_reference": "httpd-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "relates_to_product_reference": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64 as a component of httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64" }, "product_reference": "httpd-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "relates_to_product_reference": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le as a component of httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le" }, "product_reference": "httpd-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "relates_to_product_reference": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x as a component of httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x" }, "product_reference": "httpd-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "relates_to_product_reference": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64 as a component of httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64" }, "product_reference": "httpd-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "relates_to_product_reference": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debugsource-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64 as a component of httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-debugsource-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64" }, "product_reference": "httpd-debugsource-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "relates_to_product_reference": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debugsource-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le as a component of httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-debugsource-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le" }, "product_reference": "httpd-debugsource-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "relates_to_product_reference": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debugsource-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x as a component of httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-debugsource-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x" }, "product_reference": "httpd-debugsource-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "relates_to_product_reference": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debugsource-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64 as a component of httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-debugsource-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64" }, "product_reference": "httpd-debugsource-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "relates_to_product_reference": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64 as a component of httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-devel-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64" }, "product_reference": "httpd-devel-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "relates_to_product_reference": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le as a component of httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-devel-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le" }, "product_reference": "httpd-devel-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "relates_to_product_reference": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x as a component of httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-devel-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x" }, "product_reference": "httpd-devel-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "relates_to_product_reference": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64 as a component of httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-devel-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64" }, "product_reference": "httpd-devel-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "relates_to_product_reference": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-filesystem-0:2.4.37-11.module+el8.0.0+2969+90015743.noarch as a component of httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-filesystem-0:2.4.37-11.module+el8.0.0+2969+90015743.noarch" }, "product_reference": "httpd-filesystem-0:2.4.37-11.module+el8.0.0+2969+90015743.noarch", "relates_to_product_reference": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-manual-0:2.4.37-11.module+el8.0.0+2969+90015743.noarch as a component of httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-manual-0:2.4.37-11.module+el8.0.0+2969+90015743.noarch" }, "product_reference": "httpd-manual-0:2.4.37-11.module+el8.0.0+2969+90015743.noarch", "relates_to_product_reference": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64 as a component of httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-tools-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64" }, "product_reference": "httpd-tools-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "relates_to_product_reference": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le as a component of httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-tools-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le" }, "product_reference": "httpd-tools-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "relates_to_product_reference": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x as a component of httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-tools-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x" }, "product_reference": "httpd-tools-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "relates_to_product_reference": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64 as a component of httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-tools-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64" }, "product_reference": "httpd-tools-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "relates_to_product_reference": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64 as a component of httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-tools-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64" }, "product_reference": "httpd-tools-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "relates_to_product_reference": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le as a component of httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-tools-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le" }, "product_reference": "httpd-tools-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "relates_to_product_reference": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x as a component of httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-tools-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x" }, "product_reference": "httpd-tools-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "relates_to_product_reference": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64 as a component of httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-tools-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64" }, "product_reference": "httpd-tools-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "relates_to_product_reference": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5" }, { "category": "default_component_of", "full_product_name": { "name": "mod_http2-0:1.11.3-2.module+el8.0.0+2969+90015743.aarch64 as a component of httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-0:1.11.3-2.module+el8.0.0+2969+90015743.aarch64" }, "product_reference": "mod_http2-0:1.11.3-2.module+el8.0.0+2969+90015743.aarch64", "relates_to_product_reference": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5" }, { "category": "default_component_of", "full_product_name": { "name": "mod_http2-0:1.11.3-2.module+el8.0.0+2969+90015743.ppc64le as a component of httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-0:1.11.3-2.module+el8.0.0+2969+90015743.ppc64le" }, "product_reference": "mod_http2-0:1.11.3-2.module+el8.0.0+2969+90015743.ppc64le", "relates_to_product_reference": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5" }, { "category": "default_component_of", "full_product_name": { "name": "mod_http2-0:1.11.3-2.module+el8.0.0+2969+90015743.s390x as a component of httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-0:1.11.3-2.module+el8.0.0+2969+90015743.s390x" }, "product_reference": "mod_http2-0:1.11.3-2.module+el8.0.0+2969+90015743.s390x", "relates_to_product_reference": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5" }, { "category": "default_component_of", "full_product_name": { "name": "mod_http2-0:1.11.3-2.module+el8.0.0+2969+90015743.src as a component of httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-0:1.11.3-2.module+el8.0.0+2969+90015743.src" }, "product_reference": "mod_http2-0:1.11.3-2.module+el8.0.0+2969+90015743.src", "relates_to_product_reference": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5" }, { "category": "default_component_of", "full_product_name": { "name": "mod_http2-0:1.11.3-2.module+el8.0.0+2969+90015743.x86_64 as a component of httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-0:1.11.3-2.module+el8.0.0+2969+90015743.x86_64" }, "product_reference": "mod_http2-0:1.11.3-2.module+el8.0.0+2969+90015743.x86_64", "relates_to_product_reference": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5" }, { "category": "default_component_of", "full_product_name": { "name": "mod_http2-debuginfo-0:1.11.3-2.module+el8.0.0+2969+90015743.aarch64 as a component of httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-debuginfo-0:1.11.3-2.module+el8.0.0+2969+90015743.aarch64" }, "product_reference": "mod_http2-debuginfo-0:1.11.3-2.module+el8.0.0+2969+90015743.aarch64", "relates_to_product_reference": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5" }, { "category": "default_component_of", "full_product_name": { "name": "mod_http2-debuginfo-0:1.11.3-2.module+el8.0.0+2969+90015743.ppc64le as a component of httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-debuginfo-0:1.11.3-2.module+el8.0.0+2969+90015743.ppc64le" }, "product_reference": "mod_http2-debuginfo-0:1.11.3-2.module+el8.0.0+2969+90015743.ppc64le", "relates_to_product_reference": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5" }, { "category": "default_component_of", "full_product_name": { "name": "mod_http2-debuginfo-0:1.11.3-2.module+el8.0.0+2969+90015743.s390x as a component of httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-debuginfo-0:1.11.3-2.module+el8.0.0+2969+90015743.s390x" }, "product_reference": "mod_http2-debuginfo-0:1.11.3-2.module+el8.0.0+2969+90015743.s390x", "relates_to_product_reference": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5" }, { "category": "default_component_of", "full_product_name": { "name": "mod_http2-debuginfo-0:1.11.3-2.module+el8.0.0+2969+90015743.x86_64 as a component of httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-debuginfo-0:1.11.3-2.module+el8.0.0+2969+90015743.x86_64" }, "product_reference": "mod_http2-debuginfo-0:1.11.3-2.module+el8.0.0+2969+90015743.x86_64", "relates_to_product_reference": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5" }, { "category": "default_component_of", "full_product_name": { "name": "mod_http2-debugsource-0:1.11.3-2.module+el8.0.0+2969+90015743.aarch64 as a component of httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-debugsource-0:1.11.3-2.module+el8.0.0+2969+90015743.aarch64" }, "product_reference": "mod_http2-debugsource-0:1.11.3-2.module+el8.0.0+2969+90015743.aarch64", "relates_to_product_reference": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5" }, { "category": "default_component_of", "full_product_name": { "name": "mod_http2-debugsource-0:1.11.3-2.module+el8.0.0+2969+90015743.ppc64le as a component of httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-debugsource-0:1.11.3-2.module+el8.0.0+2969+90015743.ppc64le" }, "product_reference": "mod_http2-debugsource-0:1.11.3-2.module+el8.0.0+2969+90015743.ppc64le", "relates_to_product_reference": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5" }, { "category": "default_component_of", "full_product_name": { "name": "mod_http2-debugsource-0:1.11.3-2.module+el8.0.0+2969+90015743.s390x as a component of httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-debugsource-0:1.11.3-2.module+el8.0.0+2969+90015743.s390x" }, "product_reference": "mod_http2-debugsource-0:1.11.3-2.module+el8.0.0+2969+90015743.s390x", "relates_to_product_reference": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5" }, { "category": "default_component_of", "full_product_name": { "name": "mod_http2-debugsource-0:1.11.3-2.module+el8.0.0+2969+90015743.x86_64 as a component of httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-debugsource-0:1.11.3-2.module+el8.0.0+2969+90015743.x86_64" }, "product_reference": "mod_http2-debugsource-0:1.11.3-2.module+el8.0.0+2969+90015743.x86_64", "relates_to_product_reference": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64 as a component of httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ldap-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64" }, "product_reference": "mod_ldap-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "relates_to_product_reference": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le as a component of httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ldap-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le" }, "product_reference": "mod_ldap-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "relates_to_product_reference": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x as a component of httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ldap-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x" }, "product_reference": "mod_ldap-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "relates_to_product_reference": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64 as a component of httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ldap-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64" }, "product_reference": "mod_ldap-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "relates_to_product_reference": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64 as a component of httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ldap-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64" }, "product_reference": "mod_ldap-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "relates_to_product_reference": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le as a component of httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ldap-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le" }, "product_reference": "mod_ldap-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "relates_to_product_reference": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x as a component of httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ldap-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x" }, "product_reference": "mod_ldap-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "relates_to_product_reference": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64 as a component of httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ldap-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64" }, "product_reference": "mod_ldap-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "relates_to_product_reference": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5" }, { "category": "default_component_of", "full_product_name": { "name": "mod_md-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64 as a component of httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_md-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64" }, "product_reference": "mod_md-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "relates_to_product_reference": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5" }, { "category": "default_component_of", "full_product_name": { "name": "mod_md-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le as a component of httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_md-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le" }, "product_reference": "mod_md-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "relates_to_product_reference": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5" }, { "category": "default_component_of", "full_product_name": { "name": "mod_md-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x as a component of httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_md-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x" }, "product_reference": "mod_md-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "relates_to_product_reference": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5" }, { "category": "default_component_of", "full_product_name": { "name": "mod_md-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64 as a component of httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_md-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64" }, "product_reference": "mod_md-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "relates_to_product_reference": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5" }, { "category": "default_component_of", "full_product_name": { "name": "mod_md-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64 as a component of httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_md-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64" }, "product_reference": "mod_md-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "relates_to_product_reference": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5" }, { "category": "default_component_of", "full_product_name": { "name": "mod_md-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le as a component of httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_md-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le" }, "product_reference": "mod_md-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "relates_to_product_reference": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5" }, { "category": "default_component_of", "full_product_name": { "name": "mod_md-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x as a component of httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_md-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x" }, "product_reference": "mod_md-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "relates_to_product_reference": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5" }, { "category": "default_component_of", "full_product_name": { "name": "mod_md-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64 as a component of httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_md-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64" }, "product_reference": "mod_md-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "relates_to_product_reference": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-1:2.4.37-11.module+el8.0.0+2969+90015743.aarch64 as a component of httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_proxy_html-1:2.4.37-11.module+el8.0.0+2969+90015743.aarch64" }, "product_reference": "mod_proxy_html-1:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "relates_to_product_reference": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-1:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le as a component of httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_proxy_html-1:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le" }, "product_reference": "mod_proxy_html-1:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "relates_to_product_reference": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-1:2.4.37-11.module+el8.0.0+2969+90015743.s390x as a component of httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_proxy_html-1:2.4.37-11.module+el8.0.0+2969+90015743.s390x" }, "product_reference": "mod_proxy_html-1:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "relates_to_product_reference": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-1:2.4.37-11.module+el8.0.0+2969+90015743.x86_64 as a component of httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_proxy_html-1:2.4.37-11.module+el8.0.0+2969+90015743.x86_64" }, "product_reference": "mod_proxy_html-1:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "relates_to_product_reference": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.aarch64 as a component of httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_proxy_html-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.aarch64" }, "product_reference": "mod_proxy_html-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "relates_to_product_reference": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le as a component of httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_proxy_html-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le" }, "product_reference": "mod_proxy_html-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "relates_to_product_reference": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.s390x as a component of httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_proxy_html-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.s390x" }, "product_reference": "mod_proxy_html-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "relates_to_product_reference": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.x86_64 as a component of httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_proxy_html-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.x86_64" }, "product_reference": "mod_proxy_html-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "relates_to_product_reference": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64 as a component of httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_session-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64" }, "product_reference": "mod_session-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "relates_to_product_reference": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le as a component of httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_session-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le" }, "product_reference": "mod_session-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "relates_to_product_reference": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x as a component of httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_session-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x" }, "product_reference": "mod_session-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "relates_to_product_reference": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64 as a component of httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_session-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64" }, "product_reference": "mod_session-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "relates_to_product_reference": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64 as a component of httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_session-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64" }, "product_reference": "mod_session-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "relates_to_product_reference": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le as a component of httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_session-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le" }, "product_reference": "mod_session-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "relates_to_product_reference": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x as a component of httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_session-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x" }, "product_reference": "mod_session-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "relates_to_product_reference": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64 as a component of httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_session-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64" }, "product_reference": "mod_session-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "relates_to_product_reference": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.4.37-11.module+el8.0.0+2969+90015743.aarch64 as a component of httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ssl-1:2.4.37-11.module+el8.0.0+2969+90015743.aarch64" }, "product_reference": "mod_ssl-1:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "relates_to_product_reference": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le as a component of httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ssl-1:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le" }, "product_reference": "mod_ssl-1:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "relates_to_product_reference": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.4.37-11.module+el8.0.0+2969+90015743.s390x as a component of httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ssl-1:2.4.37-11.module+el8.0.0+2969+90015743.s390x" }, "product_reference": "mod_ssl-1:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "relates_to_product_reference": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.4.37-11.module+el8.0.0+2969+90015743.x86_64 as a component of httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ssl-1:2.4.37-11.module+el8.0.0+2969+90015743.x86_64" }, "product_reference": "mod_ssl-1:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "relates_to_product_reference": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.aarch64 as a component of httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ssl-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.aarch64" }, "product_reference": "mod_ssl-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "relates_to_product_reference": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le as a component of httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ssl-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le" }, "product_reference": "mod_ssl-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "relates_to_product_reference": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.s390x as a component of httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ssl-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.s390x" }, "product_reference": "mod_ssl-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "relates_to_product_reference": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.x86_64 as a component of httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ssl-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.x86_64" }, "product_reference": "mod_ssl-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "relates_to_product_reference": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5" } ] }, "vulnerabilities": [ { "cve": "CVE-2019-0211", "cwe": { "id": "CWE-250", "name": "Execution with Unnecessary Privileges" }, "discovery_date": "2019-04-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1694980" } ], "notes": [ { "category": "description", "text": "A flaw was found in Apache where code executing in a less-privileged child process or thread could execute arbitrary code with the privilege of the parent process (usually root). An attacker having access to run arbitrary scripts on the web server (PHP, CGI etc) could use this flaw to run code on the web server with root privileges.", "title": "Vulnerability description" }, { "category": "summary", "text": "httpd: privilege escalation from modules scripts", "title": "Vulnerability summary" }, { "category": "other", "text": "This flaw is exploitable in httpd if it is configured to allow an untrusted user to upload and execute arbitrary scripts. Due to the nature of the flaw, the uploaded script would not run as a restricted privileged user, but rather it runs as root allowing for privilege escalation from the restricted user to root on the web server. \n\nDepending on the configuration of the server, you would need local (AV:L) privileges to place the script or network (AV:N) privileges if the server ran an application that permitted uploading scripts directly. The latter scenario is not common for unauthenticated users. Once the attacker can place the script somewhere in the web root where it can be easily exploited (AC:L). This type of setup is more common in shared hosted environments (PR:L) and would allow an attacker with access to a site on the shared hosted to impact the confidentiality, integrity, and availability (CIA:H) with no interaction (UI:N). Due to the elevated privileges obtained, there is an impact to the system beyond the web server itself (S:C).", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-0:2.4.37-11.module+el8.0.0+2969+90015743.src", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-debugsource-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-debugsource-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-debugsource-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-debugsource-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-devel-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-devel-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-devel-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-devel-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-filesystem-0:2.4.37-11.module+el8.0.0+2969+90015743.noarch", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-manual-0:2.4.37-11.module+el8.0.0+2969+90015743.noarch", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-tools-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-tools-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-tools-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-tools-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-tools-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-tools-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-tools-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-tools-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-0:1.11.3-2.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-0:1.11.3-2.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-0:1.11.3-2.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-0:1.11.3-2.module+el8.0.0+2969+90015743.src", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-0:1.11.3-2.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-debuginfo-0:1.11.3-2.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-debuginfo-0:1.11.3-2.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-debuginfo-0:1.11.3-2.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-debuginfo-0:1.11.3-2.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-debugsource-0:1.11.3-2.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-debugsource-0:1.11.3-2.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-debugsource-0:1.11.3-2.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-debugsource-0:1.11.3-2.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ldap-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ldap-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ldap-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ldap-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ldap-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ldap-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ldap-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ldap-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_md-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_md-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_md-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_md-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_md-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_md-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_md-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_md-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_proxy_html-1:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_proxy_html-1:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_proxy_html-1:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_proxy_html-1:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_proxy_html-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_proxy_html-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_proxy_html-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_proxy_html-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_session-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_session-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_session-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_session-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_session-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_session-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_session-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_session-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ssl-1:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ssl-1:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ssl-1:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ssl-1:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ssl-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ssl-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ssl-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ssl-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-0211" }, { "category": "external", "summary": "RHBZ#1694980", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1694980" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-0211", "url": "https://www.cve.org/CVERecord?id=CVE-2019-0211" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-0211", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-0211" }, { "category": "external", "summary": "http://www.apache.org/dist/httpd/CHANGES_2.4", "url": "http://www.apache.org/dist/httpd/CHANGES_2.4" }, { "category": "external", "summary": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2019-0211", "url": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2019-0211" }, { "category": "external", "summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog", "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog" } ], "release_date": "2019-04-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-05-07T04:19:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically.", "product_ids": [ "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-0:2.4.37-11.module+el8.0.0+2969+90015743.src", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-debugsource-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-debugsource-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-debugsource-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-debugsource-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-devel-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-devel-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-devel-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-devel-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-filesystem-0:2.4.37-11.module+el8.0.0+2969+90015743.noarch", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-manual-0:2.4.37-11.module+el8.0.0+2969+90015743.noarch", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-tools-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-tools-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-tools-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-tools-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-tools-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-tools-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-tools-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-tools-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-0:1.11.3-2.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-0:1.11.3-2.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-0:1.11.3-2.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-0:1.11.3-2.module+el8.0.0+2969+90015743.src", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-0:1.11.3-2.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-debuginfo-0:1.11.3-2.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-debuginfo-0:1.11.3-2.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-debuginfo-0:1.11.3-2.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-debuginfo-0:1.11.3-2.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-debugsource-0:1.11.3-2.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-debugsource-0:1.11.3-2.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-debugsource-0:1.11.3-2.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-debugsource-0:1.11.3-2.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ldap-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ldap-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ldap-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ldap-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ldap-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ldap-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ldap-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ldap-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_md-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_md-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_md-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_md-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_md-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_md-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_md-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_md-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_proxy_html-1:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_proxy_html-1:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_proxy_html-1:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_proxy_html-1:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_proxy_html-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_proxy_html-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_proxy_html-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_proxy_html-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_session-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_session-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_session-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_session-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_session-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_session-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_session-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_session-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ssl-1:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ssl-1:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ssl-1:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ssl-1:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ssl-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ssl-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ssl-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ssl-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:0980" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H", "version": "3.0" }, "products": [ "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-0:2.4.37-11.module+el8.0.0+2969+90015743.src", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-debugsource-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-debugsource-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-debugsource-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-debugsource-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-devel-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-devel-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-devel-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-devel-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-filesystem-0:2.4.37-11.module+el8.0.0+2969+90015743.noarch", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-manual-0:2.4.37-11.module+el8.0.0+2969+90015743.noarch", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-tools-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-tools-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-tools-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-tools-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-tools-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-tools-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-tools-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-tools-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-0:1.11.3-2.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-0:1.11.3-2.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-0:1.11.3-2.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-0:1.11.3-2.module+el8.0.0+2969+90015743.src", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-0:1.11.3-2.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-debuginfo-0:1.11.3-2.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-debuginfo-0:1.11.3-2.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-debuginfo-0:1.11.3-2.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-debuginfo-0:1.11.3-2.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-debugsource-0:1.11.3-2.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-debugsource-0:1.11.3-2.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-debugsource-0:1.11.3-2.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-debugsource-0:1.11.3-2.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ldap-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ldap-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ldap-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ldap-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ldap-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ldap-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ldap-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ldap-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_md-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_md-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_md-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_md-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_md-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_md-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_md-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_md-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_proxy_html-1:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_proxy_html-1:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_proxy_html-1:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_proxy_html-1:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_proxy_html-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_proxy_html-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_proxy_html-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_proxy_html-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_session-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_session-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_session-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_session-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_session-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_session-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_session-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_session-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ssl-1:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ssl-1:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ssl-1:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ssl-1:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ssl-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ssl-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ssl-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ssl-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.x86_64" ] } ], "threats": [ { "category": "exploit_status", "date": "2021-11-03T00:00:00+00:00", "details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog" }, { "category": "impact", "details": "Important" } ], "title": "httpd: privilege escalation from modules scripts" }, { "cve": "CVE-2019-0215", "cwe": { "id": "CWE-284", "name": "Improper Access Control" }, "discovery_date": "2019-04-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1695025" } ], "notes": [ { "category": "description", "text": "A flaw was found in Apache HTTP Server 2.4 (releases 2.4.37 and 2.4.38). A bug in mod_ssl, when using per-location client certificate verification with TLSv1.3, allowed a client supporting Post-Handshake Authentication to bypass configured access control restrictions. An attacker could perform various unauthorized actions after bypassing the restrictions. The highest threat from this vulnerability is to data confidentiality and integrity.", "title": "Vulnerability description" }, { "category": "summary", "text": "httpd: mod_ssl: access control bypass when using per-location client certification authentication", "title": "Vulnerability summary" }, { "category": "other", "text": "This flaw can be exploited for httpd configurations where per-location client certificates are enabled and TLS 1.3 is used. \n\nThe attacker can remotely exploit this httpd flaw (AV:N). However the server had to be configured to use per-location client certificate and the attacker needs to have access to the authenticating client certificate (AC:H). No other significant privileges are required by the attacker (PR:L). The result of the attack is bypass of the configured access control restrictions (CI:H). This however does not affect the system beyond the web server itself (S:U).", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-0:2.4.37-11.module+el8.0.0+2969+90015743.src", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-debugsource-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-debugsource-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-debugsource-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-debugsource-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-devel-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-devel-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-devel-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-devel-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-filesystem-0:2.4.37-11.module+el8.0.0+2969+90015743.noarch", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-manual-0:2.4.37-11.module+el8.0.0+2969+90015743.noarch", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-tools-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-tools-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-tools-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-tools-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-tools-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-tools-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-tools-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-tools-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-0:1.11.3-2.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-0:1.11.3-2.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-0:1.11.3-2.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-0:1.11.3-2.module+el8.0.0+2969+90015743.src", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-0:1.11.3-2.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-debuginfo-0:1.11.3-2.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-debuginfo-0:1.11.3-2.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-debuginfo-0:1.11.3-2.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-debuginfo-0:1.11.3-2.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-debugsource-0:1.11.3-2.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-debugsource-0:1.11.3-2.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-debugsource-0:1.11.3-2.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-debugsource-0:1.11.3-2.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ldap-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ldap-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ldap-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ldap-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ldap-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ldap-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ldap-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ldap-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_md-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_md-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_md-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_md-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_md-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_md-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_md-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_md-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_proxy_html-1:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_proxy_html-1:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_proxy_html-1:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_proxy_html-1:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_proxy_html-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_proxy_html-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_proxy_html-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_proxy_html-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_session-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_session-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_session-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_session-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_session-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_session-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_session-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_session-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ssl-1:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ssl-1:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ssl-1:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ssl-1:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ssl-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ssl-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ssl-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ssl-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-0215" }, { "category": "external", "summary": "RHBZ#1695025", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1695025" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-0215", "url": "https://www.cve.org/CVERecord?id=CVE-2019-0215" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-0215", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-0215" }, { "category": "external", "summary": "http://www.apache.org/dist/httpd/CHANGES_2.4", "url": "http://www.apache.org/dist/httpd/CHANGES_2.4" }, { "category": "external", "summary": "https://httpd.apache.org/security/vulnerabilities_24.html", "url": "https://httpd.apache.org/security/vulnerabilities_24.html" } ], "release_date": "2019-04-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-05-07T04:19:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically.", "product_ids": [ "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-0:2.4.37-11.module+el8.0.0+2969+90015743.src", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-debugsource-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-debugsource-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-debugsource-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-debugsource-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-devel-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-devel-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-devel-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-devel-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-filesystem-0:2.4.37-11.module+el8.0.0+2969+90015743.noarch", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-manual-0:2.4.37-11.module+el8.0.0+2969+90015743.noarch", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-tools-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-tools-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-tools-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-tools-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-tools-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-tools-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-tools-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-tools-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-0:1.11.3-2.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-0:1.11.3-2.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-0:1.11.3-2.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-0:1.11.3-2.module+el8.0.0+2969+90015743.src", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-0:1.11.3-2.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-debuginfo-0:1.11.3-2.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-debuginfo-0:1.11.3-2.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-debuginfo-0:1.11.3-2.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-debuginfo-0:1.11.3-2.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-debugsource-0:1.11.3-2.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-debugsource-0:1.11.3-2.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-debugsource-0:1.11.3-2.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-debugsource-0:1.11.3-2.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ldap-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ldap-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ldap-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ldap-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ldap-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ldap-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ldap-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ldap-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_md-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_md-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_md-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_md-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_md-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_md-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_md-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_md-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_proxy_html-1:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_proxy_html-1:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_proxy_html-1:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_proxy_html-1:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_proxy_html-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_proxy_html-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_proxy_html-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_proxy_html-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_session-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_session-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_session-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_session-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_session-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_session-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_session-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_session-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ssl-1:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ssl-1:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ssl-1:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ssl-1:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ssl-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ssl-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ssl-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ssl-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:0980" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N", "version": "3.0" }, "products": [ "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-0:2.4.37-11.module+el8.0.0+2969+90015743.src", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-debugsource-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-debugsource-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-debugsource-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-debugsource-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-devel-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-devel-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-devel-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-devel-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-filesystem-0:2.4.37-11.module+el8.0.0+2969+90015743.noarch", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-manual-0:2.4.37-11.module+el8.0.0+2969+90015743.noarch", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-tools-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-tools-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-tools-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-tools-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-tools-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-tools-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-tools-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-tools-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-0:1.11.3-2.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-0:1.11.3-2.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-0:1.11.3-2.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-0:1.11.3-2.module+el8.0.0+2969+90015743.src", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-0:1.11.3-2.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-debuginfo-0:1.11.3-2.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-debuginfo-0:1.11.3-2.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-debuginfo-0:1.11.3-2.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-debuginfo-0:1.11.3-2.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-debugsource-0:1.11.3-2.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-debugsource-0:1.11.3-2.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-debugsource-0:1.11.3-2.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-debugsource-0:1.11.3-2.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ldap-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ldap-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ldap-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ldap-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ldap-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ldap-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ldap-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ldap-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_md-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_md-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_md-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_md-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_md-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_md-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_md-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_md-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_proxy_html-1:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_proxy_html-1:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_proxy_html-1:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_proxy_html-1:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_proxy_html-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_proxy_html-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_proxy_html-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_proxy_html-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_session-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_session-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_session-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_session-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_session-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_session-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_session-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_session-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ssl-1:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ssl-1:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ssl-1:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ssl-1:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ssl-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ssl-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ssl-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ssl-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "httpd: mod_ssl: access control bypass when using per-location client certification authentication" } ] }
rhsa-2019_0980
Vulnerability from csaf_redhat
Published
2019-05-07 04:19
Modified
2024-11-22 12:56
Summary
Red Hat Security Advisory: httpd:2.4 security update
Notes
Topic
An update for the httpd:2.4 module is now available for Red Hat Enterprise Linux 8.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
The httpd packages provide the Apache HTTP Server, a powerful, efficient, and extensible web server.
Security Fix(es):
* httpd: privilege escalation from modules scripts (CVE-2019-0211)
* httpd: mod_ssl: access control bypass when using per-location client certification authentication (CVE-2019-0215)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for the httpd:2.4 module is now available for Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "The httpd packages provide the Apache HTTP Server, a powerful, efficient, and extensible web server.\n\nSecurity Fix(es):\n\n* httpd: privilege escalation from modules scripts (CVE-2019-0211)\n\n* httpd: mod_ssl: access control bypass when using per-location client certification authentication (CVE-2019-0215)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2019:0980", "url": "https://access.redhat.com/errata/RHSA-2019:0980" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "1694980", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1694980" }, { "category": "external", "summary": "1695025", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1695025" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2019/rhsa-2019_0980.json" } ], "title": "Red Hat Security Advisory: httpd:2.4 security update", "tracking": { "current_release_date": "2024-11-22T12:56:59+00:00", "generator": { "date": "2024-11-22T12:56:59+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2019:0980", "initial_release_date": "2019-05-07T04:19:52+00:00", "revision_history": [ { "date": "2019-05-07T04:19:52+00:00", "number": "1", "summary": "Initial version" }, { "date": "2019-05-07T04:19:52+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-22T12:56:59+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux AppStream (v. 8)", "product": { "name": "Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z", "product_identification_helper": { "cpe": "cpe:/a:redhat:enterprise_linux:8::appstream" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "httpd:2.4:8000020190405071959:55190bc5", "product": { "name": "httpd:2.4:8000020190405071959:55190bc5", "product_id": "httpd:2.4:8000020190405071959:55190bc5", "product_identification_helper": { "purl": "pkg:rpmmod/redhat/httpd@2.4:8000020190405071959:55190bc5" } } }, { "category": "product_version", "name": "httpd-filesystem-0:2.4.37-11.module+el8.0.0+2969+90015743.noarch", "product": { "name": "httpd-filesystem-0:2.4.37-11.module+el8.0.0+2969+90015743.noarch", "product_id": "httpd-filesystem-0:2.4.37-11.module+el8.0.0+2969+90015743.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-filesystem@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=noarch" } } }, { "category": "product_version", "name": "httpd-manual-0:2.4.37-11.module+el8.0.0+2969+90015743.noarch", "product": { "name": "httpd-manual-0:2.4.37-11.module+el8.0.0+2969+90015743.noarch", "product_id": "httpd-manual-0:2.4.37-11.module+el8.0.0+2969+90015743.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-manual@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=noarch" } } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "httpd-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "product": { "name": "httpd-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "product_id": "httpd-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=s390x" } } }, { "category": "product_version", "name": "httpd-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "product": { "name": "httpd-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "product_id": "httpd-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-debuginfo@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=s390x" } } }, { "category": "product_version", "name": "httpd-debugsource-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "product": { "name": "httpd-debugsource-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "product_id": "httpd-debugsource-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-debugsource@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=s390x" } } }, { "category": "product_version", "name": "httpd-devel-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "product": { "name": "httpd-devel-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "product_id": "httpd-devel-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-devel@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=s390x" } } }, { "category": "product_version", "name": "httpd-tools-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "product": { "name": "httpd-tools-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "product_id": "httpd-tools-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-tools@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=s390x" } } }, { "category": "product_version", "name": "httpd-tools-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "product": { "name": "httpd-tools-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "product_id": "httpd-tools-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-tools-debuginfo@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=s390x" } } }, { "category": "product_version", "name": "mod_http2-0:1.11.3-2.module+el8.0.0+2969+90015743.s390x", "product": { "name": "mod_http2-0:1.11.3-2.module+el8.0.0+2969+90015743.s390x", "product_id": "mod_http2-0:1.11.3-2.module+el8.0.0+2969+90015743.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_http2@1.11.3-2.module%2Bel8.0.0%2B2969%2B90015743?arch=s390x" } } }, { "category": "product_version", "name": "mod_http2-debuginfo-0:1.11.3-2.module+el8.0.0+2969+90015743.s390x", "product": { "name": "mod_http2-debuginfo-0:1.11.3-2.module+el8.0.0+2969+90015743.s390x", "product_id": "mod_http2-debuginfo-0:1.11.3-2.module+el8.0.0+2969+90015743.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_http2-debuginfo@1.11.3-2.module%2Bel8.0.0%2B2969%2B90015743?arch=s390x" } } }, { "category": "product_version", "name": "mod_http2-debugsource-0:1.11.3-2.module+el8.0.0+2969+90015743.s390x", "product": { "name": "mod_http2-debugsource-0:1.11.3-2.module+el8.0.0+2969+90015743.s390x", "product_id": "mod_http2-debugsource-0:1.11.3-2.module+el8.0.0+2969+90015743.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_http2-debugsource@1.11.3-2.module%2Bel8.0.0%2B2969%2B90015743?arch=s390x" } } }, { "category": "product_version", "name": "mod_ldap-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "product": { "name": "mod_ldap-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "product_id": "mod_ldap-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ldap@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=s390x" } } }, { "category": "product_version", "name": "mod_ldap-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "product": { "name": "mod_ldap-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "product_id": "mod_ldap-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ldap-debuginfo@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=s390x" } } }, { "category": "product_version", "name": "mod_md-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "product": { "name": "mod_md-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "product_id": "mod_md-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_md@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=s390x" } } }, { "category": "product_version", "name": "mod_md-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "product": { "name": "mod_md-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "product_id": "mod_md-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_md-debuginfo@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=s390x" } } }, { "category": "product_version", "name": "mod_proxy_html-1:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "product": { "name": "mod_proxy_html-1:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "product_id": "mod_proxy_html-1:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_proxy_html@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_proxy_html-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "product": { "name": "mod_proxy_html-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "product_id": "mod_proxy_html-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_proxy_html-debuginfo@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_session-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "product": { "name": "mod_session-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "product_id": "mod_session-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_session@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=s390x" } } }, { "category": "product_version", "name": "mod_session-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "product": { "name": "mod_session-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "product_id": "mod_session-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_session-debuginfo@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=s390x" } } }, { "category": "product_version", "name": "mod_ssl-1:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "product": { "name": "mod_ssl-1:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "product_id": "mod_ssl-1:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ssl@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_ssl-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "product": { "name": "mod_ssl-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "product_id": "mod_ssl-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ssl-debuginfo@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=s390x\u0026epoch=1" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "httpd-0:2.4.37-11.module+el8.0.0+2969+90015743.src", "product": { "name": "httpd-0:2.4.37-11.module+el8.0.0+2969+90015743.src", "product_id": "httpd-0:2.4.37-11.module+el8.0.0+2969+90015743.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=src" } } }, { "category": "product_version", "name": "mod_http2-0:1.11.3-2.module+el8.0.0+2969+90015743.src", "product": { "name": "mod_http2-0:1.11.3-2.module+el8.0.0+2969+90015743.src", "product_id": "mod_http2-0:1.11.3-2.module+el8.0.0+2969+90015743.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_http2@1.11.3-2.module%2Bel8.0.0%2B2969%2B90015743?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "httpd-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "product": { "name": "httpd-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "product_id": "httpd-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=aarch64" } } }, { "category": "product_version", "name": "httpd-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "product": { "name": "httpd-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "product_id": "httpd-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-debuginfo@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=aarch64" } } }, { "category": "product_version", "name": "httpd-debugsource-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "product": { "name": "httpd-debugsource-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "product_id": "httpd-debugsource-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-debugsource@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=aarch64" } } }, { "category": "product_version", "name": "httpd-devel-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "product": { "name": "httpd-devel-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "product_id": "httpd-devel-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-devel@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=aarch64" } } }, { "category": "product_version", "name": "httpd-tools-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "product": { "name": "httpd-tools-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "product_id": "httpd-tools-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-tools@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=aarch64" } } }, { "category": "product_version", "name": "httpd-tools-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "product": { "name": "httpd-tools-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "product_id": "httpd-tools-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-tools-debuginfo@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=aarch64" } } }, { "category": "product_version", "name": "mod_http2-0:1.11.3-2.module+el8.0.0+2969+90015743.aarch64", "product": { "name": "mod_http2-0:1.11.3-2.module+el8.0.0+2969+90015743.aarch64", "product_id": "mod_http2-0:1.11.3-2.module+el8.0.0+2969+90015743.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_http2@1.11.3-2.module%2Bel8.0.0%2B2969%2B90015743?arch=aarch64" } } }, { "category": "product_version", "name": "mod_http2-debuginfo-0:1.11.3-2.module+el8.0.0+2969+90015743.aarch64", "product": { "name": "mod_http2-debuginfo-0:1.11.3-2.module+el8.0.0+2969+90015743.aarch64", "product_id": "mod_http2-debuginfo-0:1.11.3-2.module+el8.0.0+2969+90015743.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_http2-debuginfo@1.11.3-2.module%2Bel8.0.0%2B2969%2B90015743?arch=aarch64" } } }, { "category": "product_version", "name": "mod_http2-debugsource-0:1.11.3-2.module+el8.0.0+2969+90015743.aarch64", "product": { "name": "mod_http2-debugsource-0:1.11.3-2.module+el8.0.0+2969+90015743.aarch64", "product_id": "mod_http2-debugsource-0:1.11.3-2.module+el8.0.0+2969+90015743.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_http2-debugsource@1.11.3-2.module%2Bel8.0.0%2B2969%2B90015743?arch=aarch64" } } }, { "category": "product_version", "name": "mod_ldap-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "product": { "name": "mod_ldap-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "product_id": "mod_ldap-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ldap@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=aarch64" } } }, { "category": "product_version", "name": "mod_ldap-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "product": { "name": "mod_ldap-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "product_id": "mod_ldap-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ldap-debuginfo@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=aarch64" } } }, { "category": "product_version", "name": "mod_md-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "product": { "name": "mod_md-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "product_id": "mod_md-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_md@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=aarch64" } } }, { "category": "product_version", "name": "mod_md-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "product": { "name": "mod_md-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "product_id": "mod_md-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_md-debuginfo@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=aarch64" } } }, { "category": "product_version", "name": "mod_proxy_html-1:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "product": { "name": "mod_proxy_html-1:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "product_id": "mod_proxy_html-1:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_proxy_html@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_proxy_html-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "product": { "name": "mod_proxy_html-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "product_id": "mod_proxy_html-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_proxy_html-debuginfo@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_session-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "product": { "name": "mod_session-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "product_id": "mod_session-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_session@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=aarch64" } } }, { "category": "product_version", "name": "mod_session-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "product": { "name": "mod_session-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "product_id": "mod_session-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_session-debuginfo@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=aarch64" } } }, { "category": "product_version", "name": "mod_ssl-1:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "product": { "name": "mod_ssl-1:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "product_id": "mod_ssl-1:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ssl@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_ssl-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "product": { "name": "mod_ssl-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "product_id": "mod_ssl-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ssl-debuginfo@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=aarch64\u0026epoch=1" } } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "httpd-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "product": { "name": "httpd-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "product_id": "httpd-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=ppc64le" } } }, { "category": "product_version", "name": "httpd-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "product": { "name": "httpd-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "product_id": "httpd-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-debuginfo@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=ppc64le" } } }, { "category": "product_version", "name": "httpd-debugsource-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "product": { "name": "httpd-debugsource-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "product_id": "httpd-debugsource-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-debugsource@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=ppc64le" } } }, { "category": "product_version", "name": "httpd-devel-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "product": { "name": "httpd-devel-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "product_id": "httpd-devel-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-devel@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=ppc64le" } } }, { "category": "product_version", "name": "httpd-tools-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "product": { "name": "httpd-tools-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "product_id": "httpd-tools-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-tools@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=ppc64le" } } }, { "category": "product_version", "name": "httpd-tools-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "product": { "name": "httpd-tools-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "product_id": "httpd-tools-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-tools-debuginfo@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=ppc64le" } } }, { "category": "product_version", "name": "mod_http2-0:1.11.3-2.module+el8.0.0+2969+90015743.ppc64le", "product": { "name": "mod_http2-0:1.11.3-2.module+el8.0.0+2969+90015743.ppc64le", "product_id": "mod_http2-0:1.11.3-2.module+el8.0.0+2969+90015743.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_http2@1.11.3-2.module%2Bel8.0.0%2B2969%2B90015743?arch=ppc64le" } } }, { "category": "product_version", "name": "mod_http2-debuginfo-0:1.11.3-2.module+el8.0.0+2969+90015743.ppc64le", "product": { "name": "mod_http2-debuginfo-0:1.11.3-2.module+el8.0.0+2969+90015743.ppc64le", "product_id": "mod_http2-debuginfo-0:1.11.3-2.module+el8.0.0+2969+90015743.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_http2-debuginfo@1.11.3-2.module%2Bel8.0.0%2B2969%2B90015743?arch=ppc64le" } } }, { "category": "product_version", "name": "mod_http2-debugsource-0:1.11.3-2.module+el8.0.0+2969+90015743.ppc64le", "product": { "name": "mod_http2-debugsource-0:1.11.3-2.module+el8.0.0+2969+90015743.ppc64le", "product_id": "mod_http2-debugsource-0:1.11.3-2.module+el8.0.0+2969+90015743.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_http2-debugsource@1.11.3-2.module%2Bel8.0.0%2B2969%2B90015743?arch=ppc64le" } } }, { "category": "product_version", "name": "mod_ldap-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "product": { "name": "mod_ldap-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "product_id": "mod_ldap-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ldap@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=ppc64le" } } }, { "category": "product_version", "name": "mod_ldap-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "product": { "name": "mod_ldap-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "product_id": "mod_ldap-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ldap-debuginfo@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=ppc64le" } } }, { "category": "product_version", "name": "mod_md-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "product": { "name": "mod_md-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "product_id": "mod_md-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_md@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=ppc64le" } } }, { "category": "product_version", "name": "mod_md-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "product": { "name": "mod_md-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "product_id": "mod_md-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_md-debuginfo@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=ppc64le" } } }, { "category": "product_version", "name": "mod_proxy_html-1:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "product": { "name": "mod_proxy_html-1:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "product_id": "mod_proxy_html-1:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_proxy_html@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_proxy_html-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "product": { "name": "mod_proxy_html-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "product_id": "mod_proxy_html-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_proxy_html-debuginfo@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_session-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "product": { "name": "mod_session-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "product_id": "mod_session-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_session@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=ppc64le" } } }, { "category": "product_version", "name": "mod_session-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "product": { "name": "mod_session-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "product_id": "mod_session-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_session-debuginfo@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=ppc64le" } } }, { "category": "product_version", "name": "mod_ssl-1:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "product": { "name": "mod_ssl-1:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "product_id": "mod_ssl-1:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ssl@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_ssl-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "product": { "name": "mod_ssl-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "product_id": "mod_ssl-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ssl-debuginfo@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=ppc64le\u0026epoch=1" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "httpd-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "product": { "name": "httpd-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "product_id": "httpd-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=x86_64" } } }, { "category": "product_version", "name": "httpd-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "product": { "name": "httpd-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "product_id": "httpd-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-debuginfo@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=x86_64" } } }, { "category": "product_version", "name": "httpd-debugsource-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "product": { "name": "httpd-debugsource-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "product_id": "httpd-debugsource-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-debugsource@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=x86_64" } } }, { "category": "product_version", "name": "httpd-devel-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "product": { "name": "httpd-devel-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "product_id": "httpd-devel-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-devel@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=x86_64" } } }, { "category": "product_version", "name": "httpd-tools-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "product": { "name": "httpd-tools-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "product_id": "httpd-tools-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-tools@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=x86_64" } } }, { "category": "product_version", "name": "httpd-tools-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "product": { "name": "httpd-tools-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "product_id": "httpd-tools-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-tools-debuginfo@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=x86_64" } } }, { "category": "product_version", "name": "mod_http2-0:1.11.3-2.module+el8.0.0+2969+90015743.x86_64", "product": { "name": "mod_http2-0:1.11.3-2.module+el8.0.0+2969+90015743.x86_64", "product_id": "mod_http2-0:1.11.3-2.module+el8.0.0+2969+90015743.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_http2@1.11.3-2.module%2Bel8.0.0%2B2969%2B90015743?arch=x86_64" } } }, { "category": "product_version", "name": "mod_http2-debuginfo-0:1.11.3-2.module+el8.0.0+2969+90015743.x86_64", "product": { "name": "mod_http2-debuginfo-0:1.11.3-2.module+el8.0.0+2969+90015743.x86_64", "product_id": "mod_http2-debuginfo-0:1.11.3-2.module+el8.0.0+2969+90015743.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_http2-debuginfo@1.11.3-2.module%2Bel8.0.0%2B2969%2B90015743?arch=x86_64" } } }, { "category": "product_version", "name": "mod_http2-debugsource-0:1.11.3-2.module+el8.0.0+2969+90015743.x86_64", "product": { "name": "mod_http2-debugsource-0:1.11.3-2.module+el8.0.0+2969+90015743.x86_64", "product_id": "mod_http2-debugsource-0:1.11.3-2.module+el8.0.0+2969+90015743.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_http2-debugsource@1.11.3-2.module%2Bel8.0.0%2B2969%2B90015743?arch=x86_64" } } }, { "category": "product_version", "name": "mod_ldap-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "product": { "name": "mod_ldap-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "product_id": "mod_ldap-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ldap@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=x86_64" } } }, { "category": "product_version", "name": "mod_ldap-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "product": { "name": "mod_ldap-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "product_id": "mod_ldap-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ldap-debuginfo@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=x86_64" } } }, { "category": "product_version", "name": "mod_md-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "product": { "name": "mod_md-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "product_id": "mod_md-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_md@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=x86_64" } } }, { "category": "product_version", "name": "mod_md-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "product": { "name": "mod_md-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "product_id": "mod_md-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_md-debuginfo@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=x86_64" } } }, { "category": "product_version", "name": "mod_proxy_html-1:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "product": { "name": "mod_proxy_html-1:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "product_id": "mod_proxy_html-1:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_proxy_html@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_proxy_html-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "product": { "name": "mod_proxy_html-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "product_id": "mod_proxy_html-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_proxy_html-debuginfo@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_session-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "product": { "name": "mod_session-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "product_id": "mod_session-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_session@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=x86_64" } } }, { "category": "product_version", "name": "mod_session-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "product": { "name": "mod_session-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "product_id": "mod_session-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_session-debuginfo@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=x86_64" } } }, { "category": "product_version", "name": "mod_ssl-1:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "product": { "name": "mod_ssl-1:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "product_id": "mod_ssl-1:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ssl@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_ssl-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "product": { "name": "mod_ssl-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "product_id": "mod_ssl-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ssl-debuginfo@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=x86_64\u0026epoch=1" } } } ], "category": "architecture", "name": "x86_64" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5" }, "product_reference": "httpd:2.4:8000020190405071959:55190bc5", "relates_to_product_reference": "AppStream-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64 as a component of httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64" }, "product_reference": "httpd-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "relates_to_product_reference": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le as a component of httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le" }, "product_reference": "httpd-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "relates_to_product_reference": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x as a component of httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x" }, "product_reference": "httpd-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "relates_to_product_reference": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.37-11.module+el8.0.0+2969+90015743.src as a component of httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-0:2.4.37-11.module+el8.0.0+2969+90015743.src" }, "product_reference": "httpd-0:2.4.37-11.module+el8.0.0+2969+90015743.src", "relates_to_product_reference": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64 as a component of httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64" }, "product_reference": "httpd-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "relates_to_product_reference": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64 as a component of httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64" }, "product_reference": "httpd-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "relates_to_product_reference": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le as a component of httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le" }, "product_reference": "httpd-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "relates_to_product_reference": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x as a component of httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x" }, "product_reference": "httpd-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "relates_to_product_reference": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64 as a component of httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64" }, "product_reference": "httpd-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "relates_to_product_reference": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debugsource-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64 as a component of httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-debugsource-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64" }, "product_reference": "httpd-debugsource-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "relates_to_product_reference": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debugsource-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le as a component of httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-debugsource-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le" }, "product_reference": "httpd-debugsource-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "relates_to_product_reference": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debugsource-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x as a component of httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-debugsource-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x" }, "product_reference": "httpd-debugsource-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "relates_to_product_reference": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debugsource-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64 as a component of httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-debugsource-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64" }, "product_reference": "httpd-debugsource-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "relates_to_product_reference": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64 as a component of httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-devel-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64" }, "product_reference": "httpd-devel-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "relates_to_product_reference": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le as a component of httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-devel-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le" }, "product_reference": "httpd-devel-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "relates_to_product_reference": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x as a component of httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-devel-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x" }, "product_reference": "httpd-devel-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "relates_to_product_reference": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64 as a component of httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-devel-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64" }, "product_reference": "httpd-devel-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "relates_to_product_reference": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-filesystem-0:2.4.37-11.module+el8.0.0+2969+90015743.noarch as a component of httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-filesystem-0:2.4.37-11.module+el8.0.0+2969+90015743.noarch" }, "product_reference": "httpd-filesystem-0:2.4.37-11.module+el8.0.0+2969+90015743.noarch", "relates_to_product_reference": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-manual-0:2.4.37-11.module+el8.0.0+2969+90015743.noarch as a component of httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-manual-0:2.4.37-11.module+el8.0.0+2969+90015743.noarch" }, "product_reference": "httpd-manual-0:2.4.37-11.module+el8.0.0+2969+90015743.noarch", "relates_to_product_reference": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64 as a component of httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-tools-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64" }, "product_reference": "httpd-tools-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "relates_to_product_reference": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le as a component of httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-tools-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le" }, "product_reference": "httpd-tools-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "relates_to_product_reference": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x as a component of httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-tools-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x" }, "product_reference": "httpd-tools-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "relates_to_product_reference": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64 as a component of httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-tools-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64" }, "product_reference": "httpd-tools-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "relates_to_product_reference": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64 as a component of httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-tools-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64" }, "product_reference": "httpd-tools-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "relates_to_product_reference": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le as a component of httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-tools-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le" }, "product_reference": "httpd-tools-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "relates_to_product_reference": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x as a component of httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-tools-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x" }, "product_reference": "httpd-tools-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "relates_to_product_reference": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64 as a component of httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-tools-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64" }, "product_reference": "httpd-tools-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "relates_to_product_reference": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5" }, { "category": "default_component_of", "full_product_name": { "name": "mod_http2-0:1.11.3-2.module+el8.0.0+2969+90015743.aarch64 as a component of httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-0:1.11.3-2.module+el8.0.0+2969+90015743.aarch64" }, "product_reference": "mod_http2-0:1.11.3-2.module+el8.0.0+2969+90015743.aarch64", "relates_to_product_reference": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5" }, { "category": "default_component_of", "full_product_name": { "name": "mod_http2-0:1.11.3-2.module+el8.0.0+2969+90015743.ppc64le as a component of httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-0:1.11.3-2.module+el8.0.0+2969+90015743.ppc64le" }, "product_reference": "mod_http2-0:1.11.3-2.module+el8.0.0+2969+90015743.ppc64le", "relates_to_product_reference": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5" }, { "category": "default_component_of", "full_product_name": { "name": "mod_http2-0:1.11.3-2.module+el8.0.0+2969+90015743.s390x as a component of httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-0:1.11.3-2.module+el8.0.0+2969+90015743.s390x" }, "product_reference": "mod_http2-0:1.11.3-2.module+el8.0.0+2969+90015743.s390x", "relates_to_product_reference": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5" }, { "category": "default_component_of", "full_product_name": { "name": "mod_http2-0:1.11.3-2.module+el8.0.0+2969+90015743.src as a component of httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-0:1.11.3-2.module+el8.0.0+2969+90015743.src" }, "product_reference": "mod_http2-0:1.11.3-2.module+el8.0.0+2969+90015743.src", "relates_to_product_reference": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5" }, { "category": "default_component_of", "full_product_name": { "name": "mod_http2-0:1.11.3-2.module+el8.0.0+2969+90015743.x86_64 as a component of httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-0:1.11.3-2.module+el8.0.0+2969+90015743.x86_64" }, "product_reference": "mod_http2-0:1.11.3-2.module+el8.0.0+2969+90015743.x86_64", "relates_to_product_reference": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5" }, { "category": "default_component_of", "full_product_name": { "name": "mod_http2-debuginfo-0:1.11.3-2.module+el8.0.0+2969+90015743.aarch64 as a component of httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-debuginfo-0:1.11.3-2.module+el8.0.0+2969+90015743.aarch64" }, "product_reference": "mod_http2-debuginfo-0:1.11.3-2.module+el8.0.0+2969+90015743.aarch64", "relates_to_product_reference": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5" }, { "category": "default_component_of", "full_product_name": { "name": "mod_http2-debuginfo-0:1.11.3-2.module+el8.0.0+2969+90015743.ppc64le as a component of httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-debuginfo-0:1.11.3-2.module+el8.0.0+2969+90015743.ppc64le" }, "product_reference": "mod_http2-debuginfo-0:1.11.3-2.module+el8.0.0+2969+90015743.ppc64le", "relates_to_product_reference": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5" }, { "category": "default_component_of", "full_product_name": { "name": "mod_http2-debuginfo-0:1.11.3-2.module+el8.0.0+2969+90015743.s390x as a component of httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-debuginfo-0:1.11.3-2.module+el8.0.0+2969+90015743.s390x" }, "product_reference": "mod_http2-debuginfo-0:1.11.3-2.module+el8.0.0+2969+90015743.s390x", "relates_to_product_reference": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5" }, { "category": "default_component_of", "full_product_name": { "name": "mod_http2-debuginfo-0:1.11.3-2.module+el8.0.0+2969+90015743.x86_64 as a component of httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-debuginfo-0:1.11.3-2.module+el8.0.0+2969+90015743.x86_64" }, "product_reference": "mod_http2-debuginfo-0:1.11.3-2.module+el8.0.0+2969+90015743.x86_64", "relates_to_product_reference": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5" }, { "category": "default_component_of", "full_product_name": { "name": "mod_http2-debugsource-0:1.11.3-2.module+el8.0.0+2969+90015743.aarch64 as a component of httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-debugsource-0:1.11.3-2.module+el8.0.0+2969+90015743.aarch64" }, "product_reference": "mod_http2-debugsource-0:1.11.3-2.module+el8.0.0+2969+90015743.aarch64", "relates_to_product_reference": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5" }, { "category": "default_component_of", "full_product_name": { "name": "mod_http2-debugsource-0:1.11.3-2.module+el8.0.0+2969+90015743.ppc64le as a component of httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-debugsource-0:1.11.3-2.module+el8.0.0+2969+90015743.ppc64le" }, "product_reference": "mod_http2-debugsource-0:1.11.3-2.module+el8.0.0+2969+90015743.ppc64le", "relates_to_product_reference": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5" }, { "category": "default_component_of", "full_product_name": { "name": "mod_http2-debugsource-0:1.11.3-2.module+el8.0.0+2969+90015743.s390x as a component of httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-debugsource-0:1.11.3-2.module+el8.0.0+2969+90015743.s390x" }, "product_reference": "mod_http2-debugsource-0:1.11.3-2.module+el8.0.0+2969+90015743.s390x", "relates_to_product_reference": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5" }, { "category": "default_component_of", "full_product_name": { "name": "mod_http2-debugsource-0:1.11.3-2.module+el8.0.0+2969+90015743.x86_64 as a component of httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-debugsource-0:1.11.3-2.module+el8.0.0+2969+90015743.x86_64" }, "product_reference": "mod_http2-debugsource-0:1.11.3-2.module+el8.0.0+2969+90015743.x86_64", "relates_to_product_reference": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64 as a component of httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ldap-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64" }, "product_reference": "mod_ldap-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "relates_to_product_reference": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le as a component of httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ldap-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le" }, "product_reference": "mod_ldap-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "relates_to_product_reference": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x as a component of httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ldap-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x" }, "product_reference": "mod_ldap-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "relates_to_product_reference": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64 as a component of httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ldap-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64" }, "product_reference": "mod_ldap-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "relates_to_product_reference": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64 as a component of httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ldap-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64" }, "product_reference": "mod_ldap-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "relates_to_product_reference": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le as a component of httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ldap-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le" }, "product_reference": "mod_ldap-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "relates_to_product_reference": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x as a component of httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ldap-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x" }, "product_reference": "mod_ldap-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "relates_to_product_reference": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64 as a component of httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ldap-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64" }, "product_reference": "mod_ldap-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "relates_to_product_reference": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5" }, { "category": "default_component_of", "full_product_name": { "name": "mod_md-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64 as a component of httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_md-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64" }, "product_reference": "mod_md-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "relates_to_product_reference": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5" }, { "category": "default_component_of", "full_product_name": { "name": "mod_md-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le as a component of httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_md-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le" }, "product_reference": "mod_md-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "relates_to_product_reference": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5" }, { "category": "default_component_of", "full_product_name": { "name": "mod_md-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x as a component of httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_md-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x" }, "product_reference": "mod_md-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "relates_to_product_reference": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5" }, { "category": "default_component_of", "full_product_name": { "name": "mod_md-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64 as a component of httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_md-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64" }, "product_reference": "mod_md-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "relates_to_product_reference": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5" }, { "category": "default_component_of", "full_product_name": { "name": "mod_md-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64 as a component of httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_md-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64" }, "product_reference": "mod_md-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "relates_to_product_reference": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5" }, { "category": "default_component_of", "full_product_name": { "name": "mod_md-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le as a component of httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_md-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le" }, "product_reference": "mod_md-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "relates_to_product_reference": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5" }, { "category": "default_component_of", "full_product_name": { "name": "mod_md-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x as a component of httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_md-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x" }, "product_reference": "mod_md-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "relates_to_product_reference": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5" }, { "category": "default_component_of", "full_product_name": { "name": "mod_md-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64 as a component of httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_md-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64" }, "product_reference": "mod_md-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "relates_to_product_reference": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-1:2.4.37-11.module+el8.0.0+2969+90015743.aarch64 as a component of httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_proxy_html-1:2.4.37-11.module+el8.0.0+2969+90015743.aarch64" }, "product_reference": "mod_proxy_html-1:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "relates_to_product_reference": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-1:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le as a component of httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_proxy_html-1:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le" }, "product_reference": "mod_proxy_html-1:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "relates_to_product_reference": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-1:2.4.37-11.module+el8.0.0+2969+90015743.s390x as a component of httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_proxy_html-1:2.4.37-11.module+el8.0.0+2969+90015743.s390x" }, "product_reference": "mod_proxy_html-1:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "relates_to_product_reference": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-1:2.4.37-11.module+el8.0.0+2969+90015743.x86_64 as a component of httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_proxy_html-1:2.4.37-11.module+el8.0.0+2969+90015743.x86_64" }, "product_reference": "mod_proxy_html-1:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "relates_to_product_reference": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.aarch64 as a component of httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_proxy_html-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.aarch64" }, "product_reference": "mod_proxy_html-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "relates_to_product_reference": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le as a component of httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_proxy_html-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le" }, "product_reference": "mod_proxy_html-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "relates_to_product_reference": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.s390x as a component of httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_proxy_html-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.s390x" }, "product_reference": "mod_proxy_html-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "relates_to_product_reference": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.x86_64 as a component of httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_proxy_html-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.x86_64" }, "product_reference": "mod_proxy_html-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "relates_to_product_reference": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64 as a component of httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_session-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64" }, "product_reference": "mod_session-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "relates_to_product_reference": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le as a component of httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_session-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le" }, "product_reference": "mod_session-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "relates_to_product_reference": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x as a component of httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_session-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x" }, "product_reference": "mod_session-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "relates_to_product_reference": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64 as a component of httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_session-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64" }, "product_reference": "mod_session-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "relates_to_product_reference": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64 as a component of httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_session-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64" }, "product_reference": "mod_session-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "relates_to_product_reference": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le as a component of httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_session-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le" }, "product_reference": "mod_session-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "relates_to_product_reference": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x as a component of httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_session-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x" }, "product_reference": "mod_session-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "relates_to_product_reference": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64 as a component of httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_session-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64" }, "product_reference": "mod_session-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "relates_to_product_reference": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.4.37-11.module+el8.0.0+2969+90015743.aarch64 as a component of httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ssl-1:2.4.37-11.module+el8.0.0+2969+90015743.aarch64" }, "product_reference": "mod_ssl-1:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "relates_to_product_reference": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le as a component of httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ssl-1:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le" }, "product_reference": "mod_ssl-1:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "relates_to_product_reference": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.4.37-11.module+el8.0.0+2969+90015743.s390x as a component of httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ssl-1:2.4.37-11.module+el8.0.0+2969+90015743.s390x" }, "product_reference": "mod_ssl-1:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "relates_to_product_reference": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.4.37-11.module+el8.0.0+2969+90015743.x86_64 as a component of httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ssl-1:2.4.37-11.module+el8.0.0+2969+90015743.x86_64" }, "product_reference": "mod_ssl-1:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "relates_to_product_reference": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.aarch64 as a component of httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ssl-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.aarch64" }, "product_reference": "mod_ssl-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "relates_to_product_reference": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le as a component of httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ssl-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le" }, "product_reference": "mod_ssl-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "relates_to_product_reference": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.s390x as a component of httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ssl-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.s390x" }, "product_reference": "mod_ssl-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "relates_to_product_reference": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.x86_64 as a component of httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ssl-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.x86_64" }, "product_reference": "mod_ssl-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "relates_to_product_reference": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5" } ] }, "vulnerabilities": [ { "cve": "CVE-2019-0211", "cwe": { "id": "CWE-250", "name": "Execution with Unnecessary Privileges" }, "discovery_date": "2019-04-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1694980" } ], "notes": [ { "category": "description", "text": "A flaw was found in Apache where code executing in a less-privileged child process or thread could execute arbitrary code with the privilege of the parent process (usually root). An attacker having access to run arbitrary scripts on the web server (PHP, CGI etc) could use this flaw to run code on the web server with root privileges.", "title": "Vulnerability description" }, { "category": "summary", "text": "httpd: privilege escalation from modules scripts", "title": "Vulnerability summary" }, { "category": "other", "text": "This flaw is exploitable in httpd if it is configured to allow an untrusted user to upload and execute arbitrary scripts. Due to the nature of the flaw, the uploaded script would not run as a restricted privileged user, but rather it runs as root allowing for privilege escalation from the restricted user to root on the web server. \n\nDepending on the configuration of the server, you would need local (AV:L) privileges to place the script or network (AV:N) privileges if the server ran an application that permitted uploading scripts directly. The latter scenario is not common for unauthenticated users. Once the attacker can place the script somewhere in the web root where it can be easily exploited (AC:L). This type of setup is more common in shared hosted environments (PR:L) and would allow an attacker with access to a site on the shared hosted to impact the confidentiality, integrity, and availability (CIA:H) with no interaction (UI:N). Due to the elevated privileges obtained, there is an impact to the system beyond the web server itself (S:C).", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-0:2.4.37-11.module+el8.0.0+2969+90015743.src", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-debugsource-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-debugsource-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-debugsource-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-debugsource-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-devel-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-devel-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-devel-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-devel-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-filesystem-0:2.4.37-11.module+el8.0.0+2969+90015743.noarch", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-manual-0:2.4.37-11.module+el8.0.0+2969+90015743.noarch", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-tools-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-tools-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-tools-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-tools-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-tools-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-tools-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-tools-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-tools-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-0:1.11.3-2.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-0:1.11.3-2.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-0:1.11.3-2.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-0:1.11.3-2.module+el8.0.0+2969+90015743.src", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-0:1.11.3-2.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-debuginfo-0:1.11.3-2.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-debuginfo-0:1.11.3-2.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-debuginfo-0:1.11.3-2.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-debuginfo-0:1.11.3-2.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-debugsource-0:1.11.3-2.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-debugsource-0:1.11.3-2.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-debugsource-0:1.11.3-2.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-debugsource-0:1.11.3-2.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ldap-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ldap-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ldap-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ldap-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ldap-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ldap-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ldap-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ldap-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_md-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_md-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_md-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_md-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_md-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_md-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_md-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_md-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_proxy_html-1:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_proxy_html-1:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_proxy_html-1:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_proxy_html-1:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_proxy_html-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_proxy_html-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_proxy_html-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_proxy_html-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_session-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_session-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_session-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_session-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_session-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_session-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_session-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_session-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ssl-1:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ssl-1:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ssl-1:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ssl-1:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ssl-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ssl-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ssl-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ssl-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-0211" }, { "category": "external", "summary": "RHBZ#1694980", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1694980" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-0211", "url": "https://www.cve.org/CVERecord?id=CVE-2019-0211" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-0211", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-0211" }, { "category": "external", "summary": "http://www.apache.org/dist/httpd/CHANGES_2.4", "url": "http://www.apache.org/dist/httpd/CHANGES_2.4" }, { "category": "external", "summary": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2019-0211", "url": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2019-0211" }, { "category": "external", "summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog", "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog" } ], "release_date": "2019-04-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-05-07T04:19:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically.", "product_ids": [ "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-0:2.4.37-11.module+el8.0.0+2969+90015743.src", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-debugsource-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-debugsource-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-debugsource-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-debugsource-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-devel-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-devel-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-devel-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-devel-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-filesystem-0:2.4.37-11.module+el8.0.0+2969+90015743.noarch", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-manual-0:2.4.37-11.module+el8.0.0+2969+90015743.noarch", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-tools-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-tools-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-tools-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-tools-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-tools-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-tools-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-tools-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-tools-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-0:1.11.3-2.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-0:1.11.3-2.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-0:1.11.3-2.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-0:1.11.3-2.module+el8.0.0+2969+90015743.src", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-0:1.11.3-2.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-debuginfo-0:1.11.3-2.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-debuginfo-0:1.11.3-2.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-debuginfo-0:1.11.3-2.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-debuginfo-0:1.11.3-2.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-debugsource-0:1.11.3-2.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-debugsource-0:1.11.3-2.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-debugsource-0:1.11.3-2.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-debugsource-0:1.11.3-2.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ldap-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ldap-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ldap-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ldap-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ldap-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ldap-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ldap-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ldap-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_md-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_md-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_md-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_md-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_md-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_md-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_md-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_md-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_proxy_html-1:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_proxy_html-1:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_proxy_html-1:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_proxy_html-1:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_proxy_html-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_proxy_html-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_proxy_html-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_proxy_html-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_session-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_session-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_session-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_session-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_session-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_session-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_session-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_session-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ssl-1:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ssl-1:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ssl-1:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ssl-1:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ssl-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ssl-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ssl-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ssl-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:0980" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H", "version": "3.0" }, "products": [ "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-0:2.4.37-11.module+el8.0.0+2969+90015743.src", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-debugsource-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-debugsource-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-debugsource-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-debugsource-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-devel-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-devel-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-devel-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-devel-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-filesystem-0:2.4.37-11.module+el8.0.0+2969+90015743.noarch", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-manual-0:2.4.37-11.module+el8.0.0+2969+90015743.noarch", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-tools-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-tools-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-tools-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-tools-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-tools-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-tools-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-tools-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-tools-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-0:1.11.3-2.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-0:1.11.3-2.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-0:1.11.3-2.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-0:1.11.3-2.module+el8.0.0+2969+90015743.src", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-0:1.11.3-2.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-debuginfo-0:1.11.3-2.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-debuginfo-0:1.11.3-2.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-debuginfo-0:1.11.3-2.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-debuginfo-0:1.11.3-2.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-debugsource-0:1.11.3-2.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-debugsource-0:1.11.3-2.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-debugsource-0:1.11.3-2.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-debugsource-0:1.11.3-2.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ldap-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ldap-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ldap-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ldap-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ldap-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ldap-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ldap-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ldap-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_md-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_md-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_md-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_md-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_md-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_md-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_md-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_md-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_proxy_html-1:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_proxy_html-1:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_proxy_html-1:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_proxy_html-1:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_proxy_html-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_proxy_html-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_proxy_html-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_proxy_html-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_session-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_session-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_session-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_session-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_session-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_session-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_session-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_session-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ssl-1:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ssl-1:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ssl-1:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ssl-1:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ssl-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ssl-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ssl-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ssl-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.x86_64" ] } ], "threats": [ { "category": "exploit_status", "date": "2021-11-03T00:00:00+00:00", "details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog" }, { "category": "impact", "details": "Important" } ], "title": "httpd: privilege escalation from modules scripts" }, { "cve": "CVE-2019-0215", "cwe": { "id": "CWE-284", "name": "Improper Access Control" }, "discovery_date": "2019-04-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1695025" } ], "notes": [ { "category": "description", "text": "A flaw was found in Apache HTTP Server 2.4 (releases 2.4.37 and 2.4.38). A bug in mod_ssl, when using per-location client certificate verification with TLSv1.3, allowed a client supporting Post-Handshake Authentication to bypass configured access control restrictions. An attacker could perform various unauthorized actions after bypassing the restrictions. The highest threat from this vulnerability is to data confidentiality and integrity.", "title": "Vulnerability description" }, { "category": "summary", "text": "httpd: mod_ssl: access control bypass when using per-location client certification authentication", "title": "Vulnerability summary" }, { "category": "other", "text": "This flaw can be exploited for httpd configurations where per-location client certificates are enabled and TLS 1.3 is used. \n\nThe attacker can remotely exploit this httpd flaw (AV:N). However the server had to be configured to use per-location client certificate and the attacker needs to have access to the authenticating client certificate (AC:H). No other significant privileges are required by the attacker (PR:L). The result of the attack is bypass of the configured access control restrictions (CI:H). This however does not affect the system beyond the web server itself (S:U).", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-0:2.4.37-11.module+el8.0.0+2969+90015743.src", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-debugsource-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-debugsource-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-debugsource-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-debugsource-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-devel-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-devel-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-devel-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-devel-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-filesystem-0:2.4.37-11.module+el8.0.0+2969+90015743.noarch", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-manual-0:2.4.37-11.module+el8.0.0+2969+90015743.noarch", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-tools-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-tools-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-tools-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-tools-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-tools-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-tools-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-tools-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-tools-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-0:1.11.3-2.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-0:1.11.3-2.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-0:1.11.3-2.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-0:1.11.3-2.module+el8.0.0+2969+90015743.src", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-0:1.11.3-2.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-debuginfo-0:1.11.3-2.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-debuginfo-0:1.11.3-2.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-debuginfo-0:1.11.3-2.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-debuginfo-0:1.11.3-2.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-debugsource-0:1.11.3-2.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-debugsource-0:1.11.3-2.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-debugsource-0:1.11.3-2.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-debugsource-0:1.11.3-2.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ldap-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ldap-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ldap-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ldap-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ldap-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ldap-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ldap-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ldap-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_md-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_md-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_md-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_md-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_md-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_md-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_md-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_md-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_proxy_html-1:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_proxy_html-1:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_proxy_html-1:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_proxy_html-1:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_proxy_html-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_proxy_html-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_proxy_html-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_proxy_html-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_session-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_session-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_session-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_session-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_session-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_session-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_session-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_session-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ssl-1:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ssl-1:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ssl-1:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ssl-1:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ssl-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ssl-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ssl-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ssl-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-0215" }, { "category": "external", "summary": "RHBZ#1695025", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1695025" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-0215", "url": "https://www.cve.org/CVERecord?id=CVE-2019-0215" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-0215", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-0215" }, { "category": "external", "summary": "http://www.apache.org/dist/httpd/CHANGES_2.4", "url": "http://www.apache.org/dist/httpd/CHANGES_2.4" }, { "category": "external", "summary": "https://httpd.apache.org/security/vulnerabilities_24.html", "url": "https://httpd.apache.org/security/vulnerabilities_24.html" } ], "release_date": "2019-04-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-05-07T04:19:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically.", "product_ids": [ "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-0:2.4.37-11.module+el8.0.0+2969+90015743.src", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-debugsource-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-debugsource-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-debugsource-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-debugsource-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-devel-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-devel-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-devel-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-devel-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-filesystem-0:2.4.37-11.module+el8.0.0+2969+90015743.noarch", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-manual-0:2.4.37-11.module+el8.0.0+2969+90015743.noarch", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-tools-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-tools-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-tools-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-tools-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-tools-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-tools-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-tools-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-tools-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-0:1.11.3-2.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-0:1.11.3-2.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-0:1.11.3-2.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-0:1.11.3-2.module+el8.0.0+2969+90015743.src", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-0:1.11.3-2.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-debuginfo-0:1.11.3-2.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-debuginfo-0:1.11.3-2.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-debuginfo-0:1.11.3-2.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-debuginfo-0:1.11.3-2.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-debugsource-0:1.11.3-2.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-debugsource-0:1.11.3-2.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-debugsource-0:1.11.3-2.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-debugsource-0:1.11.3-2.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ldap-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ldap-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ldap-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ldap-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ldap-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ldap-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ldap-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ldap-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_md-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_md-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_md-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_md-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_md-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_md-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_md-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_md-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_proxy_html-1:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_proxy_html-1:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_proxy_html-1:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_proxy_html-1:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_proxy_html-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_proxy_html-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_proxy_html-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_proxy_html-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_session-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_session-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_session-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_session-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_session-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_session-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_session-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_session-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ssl-1:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ssl-1:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ssl-1:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ssl-1:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ssl-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ssl-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ssl-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ssl-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:0980" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N", "version": "3.0" }, "products": [ "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-0:2.4.37-11.module+el8.0.0+2969+90015743.src", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-debugsource-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-debugsource-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-debugsource-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-debugsource-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-devel-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-devel-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-devel-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-devel-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-filesystem-0:2.4.37-11.module+el8.0.0+2969+90015743.noarch", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-manual-0:2.4.37-11.module+el8.0.0+2969+90015743.noarch", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-tools-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-tools-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-tools-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-tools-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-tools-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-tools-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-tools-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-tools-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-0:1.11.3-2.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-0:1.11.3-2.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-0:1.11.3-2.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-0:1.11.3-2.module+el8.0.0+2969+90015743.src", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-0:1.11.3-2.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-debuginfo-0:1.11.3-2.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-debuginfo-0:1.11.3-2.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-debuginfo-0:1.11.3-2.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-debuginfo-0:1.11.3-2.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-debugsource-0:1.11.3-2.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-debugsource-0:1.11.3-2.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-debugsource-0:1.11.3-2.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-debugsource-0:1.11.3-2.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ldap-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ldap-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ldap-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ldap-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ldap-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ldap-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ldap-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ldap-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_md-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_md-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_md-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_md-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_md-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_md-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_md-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_md-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_proxy_html-1:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_proxy_html-1:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_proxy_html-1:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_proxy_html-1:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_proxy_html-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_proxy_html-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_proxy_html-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_proxy_html-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_session-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_session-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_session-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_session-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_session-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_session-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_session-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_session-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ssl-1:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ssl-1:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ssl-1:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ssl-1:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ssl-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ssl-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ssl-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ssl-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "httpd: mod_ssl: access control bypass when using per-location client certification authentication" } ] }
RHSA-2019:0980
Vulnerability from csaf_redhat
Published
2019-05-07 04:19
Modified
2024-11-22 12:56
Summary
Red Hat Security Advisory: httpd:2.4 security update
Notes
Topic
An update for the httpd:2.4 module is now available for Red Hat Enterprise Linux 8.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
The httpd packages provide the Apache HTTP Server, a powerful, efficient, and extensible web server.
Security Fix(es):
* httpd: privilege escalation from modules scripts (CVE-2019-0211)
* httpd: mod_ssl: access control bypass when using per-location client certification authentication (CVE-2019-0215)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for the httpd:2.4 module is now available for Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "The httpd packages provide the Apache HTTP Server, a powerful, efficient, and extensible web server.\n\nSecurity Fix(es):\n\n* httpd: privilege escalation from modules scripts (CVE-2019-0211)\n\n* httpd: mod_ssl: access control bypass when using per-location client certification authentication (CVE-2019-0215)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2019:0980", "url": "https://access.redhat.com/errata/RHSA-2019:0980" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "1694980", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1694980" }, { "category": "external", "summary": "1695025", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1695025" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2019/rhsa-2019_0980.json" } ], "title": "Red Hat Security Advisory: httpd:2.4 security update", "tracking": { "current_release_date": "2024-11-22T12:56:59+00:00", "generator": { "date": "2024-11-22T12:56:59+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2019:0980", "initial_release_date": "2019-05-07T04:19:52+00:00", "revision_history": [ { "date": "2019-05-07T04:19:52+00:00", "number": "1", "summary": "Initial version" }, { "date": "2019-05-07T04:19:52+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-22T12:56:59+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux AppStream (v. 8)", "product": { "name": "Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z", "product_identification_helper": { "cpe": "cpe:/a:redhat:enterprise_linux:8::appstream" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "httpd:2.4:8000020190405071959:55190bc5", "product": { "name": "httpd:2.4:8000020190405071959:55190bc5", "product_id": "httpd:2.4:8000020190405071959:55190bc5", "product_identification_helper": { "purl": "pkg:rpmmod/redhat/httpd@2.4:8000020190405071959:55190bc5" } } }, { "category": "product_version", "name": "httpd-filesystem-0:2.4.37-11.module+el8.0.0+2969+90015743.noarch", "product": { "name": "httpd-filesystem-0:2.4.37-11.module+el8.0.0+2969+90015743.noarch", "product_id": "httpd-filesystem-0:2.4.37-11.module+el8.0.0+2969+90015743.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-filesystem@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=noarch" } } }, { "category": "product_version", "name": "httpd-manual-0:2.4.37-11.module+el8.0.0+2969+90015743.noarch", "product": { "name": "httpd-manual-0:2.4.37-11.module+el8.0.0+2969+90015743.noarch", "product_id": "httpd-manual-0:2.4.37-11.module+el8.0.0+2969+90015743.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-manual@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=noarch" } } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "httpd-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "product": { "name": "httpd-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "product_id": "httpd-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=s390x" } } }, { "category": "product_version", "name": "httpd-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "product": { "name": "httpd-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "product_id": "httpd-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-debuginfo@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=s390x" } } }, { "category": "product_version", "name": "httpd-debugsource-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "product": { "name": "httpd-debugsource-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "product_id": "httpd-debugsource-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-debugsource@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=s390x" } } }, { "category": "product_version", "name": "httpd-devel-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "product": { "name": "httpd-devel-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "product_id": "httpd-devel-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-devel@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=s390x" } } }, { "category": "product_version", "name": "httpd-tools-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "product": { "name": "httpd-tools-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "product_id": "httpd-tools-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-tools@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=s390x" } } }, { "category": "product_version", "name": "httpd-tools-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "product": { "name": "httpd-tools-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "product_id": "httpd-tools-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-tools-debuginfo@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=s390x" } } }, { "category": "product_version", "name": "mod_http2-0:1.11.3-2.module+el8.0.0+2969+90015743.s390x", "product": { "name": "mod_http2-0:1.11.3-2.module+el8.0.0+2969+90015743.s390x", "product_id": "mod_http2-0:1.11.3-2.module+el8.0.0+2969+90015743.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_http2@1.11.3-2.module%2Bel8.0.0%2B2969%2B90015743?arch=s390x" } } }, { "category": "product_version", "name": "mod_http2-debuginfo-0:1.11.3-2.module+el8.0.0+2969+90015743.s390x", "product": { "name": "mod_http2-debuginfo-0:1.11.3-2.module+el8.0.0+2969+90015743.s390x", "product_id": "mod_http2-debuginfo-0:1.11.3-2.module+el8.0.0+2969+90015743.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_http2-debuginfo@1.11.3-2.module%2Bel8.0.0%2B2969%2B90015743?arch=s390x" } } }, { "category": "product_version", "name": "mod_http2-debugsource-0:1.11.3-2.module+el8.0.0+2969+90015743.s390x", "product": { "name": "mod_http2-debugsource-0:1.11.3-2.module+el8.0.0+2969+90015743.s390x", "product_id": "mod_http2-debugsource-0:1.11.3-2.module+el8.0.0+2969+90015743.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_http2-debugsource@1.11.3-2.module%2Bel8.0.0%2B2969%2B90015743?arch=s390x" } } }, { "category": "product_version", "name": "mod_ldap-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "product": { "name": "mod_ldap-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "product_id": "mod_ldap-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ldap@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=s390x" } } }, { "category": "product_version", "name": "mod_ldap-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "product": { "name": "mod_ldap-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "product_id": "mod_ldap-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ldap-debuginfo@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=s390x" } } }, { "category": "product_version", "name": "mod_md-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "product": { "name": "mod_md-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "product_id": "mod_md-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_md@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=s390x" } } }, { "category": "product_version", "name": "mod_md-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "product": { "name": "mod_md-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "product_id": "mod_md-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_md-debuginfo@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=s390x" } } }, { "category": "product_version", "name": "mod_proxy_html-1:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "product": { "name": "mod_proxy_html-1:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "product_id": "mod_proxy_html-1:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_proxy_html@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_proxy_html-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "product": { "name": "mod_proxy_html-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "product_id": "mod_proxy_html-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_proxy_html-debuginfo@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_session-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "product": { "name": "mod_session-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "product_id": "mod_session-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_session@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=s390x" } } }, { "category": "product_version", "name": "mod_session-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "product": { "name": "mod_session-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "product_id": "mod_session-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_session-debuginfo@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=s390x" } } }, { "category": "product_version", "name": "mod_ssl-1:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "product": { "name": "mod_ssl-1:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "product_id": "mod_ssl-1:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ssl@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_ssl-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "product": { "name": "mod_ssl-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "product_id": "mod_ssl-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ssl-debuginfo@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=s390x\u0026epoch=1" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "httpd-0:2.4.37-11.module+el8.0.0+2969+90015743.src", "product": { "name": "httpd-0:2.4.37-11.module+el8.0.0+2969+90015743.src", "product_id": "httpd-0:2.4.37-11.module+el8.0.0+2969+90015743.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=src" } } }, { "category": "product_version", "name": "mod_http2-0:1.11.3-2.module+el8.0.0+2969+90015743.src", "product": { "name": "mod_http2-0:1.11.3-2.module+el8.0.0+2969+90015743.src", "product_id": "mod_http2-0:1.11.3-2.module+el8.0.0+2969+90015743.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_http2@1.11.3-2.module%2Bel8.0.0%2B2969%2B90015743?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "httpd-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "product": { "name": "httpd-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "product_id": "httpd-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=aarch64" } } }, { "category": "product_version", "name": "httpd-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "product": { "name": "httpd-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "product_id": "httpd-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-debuginfo@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=aarch64" } } }, { "category": "product_version", "name": "httpd-debugsource-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "product": { "name": "httpd-debugsource-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "product_id": "httpd-debugsource-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-debugsource@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=aarch64" } } }, { "category": "product_version", "name": "httpd-devel-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "product": { "name": "httpd-devel-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "product_id": "httpd-devel-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-devel@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=aarch64" } } }, { "category": "product_version", "name": "httpd-tools-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "product": { "name": "httpd-tools-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "product_id": "httpd-tools-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-tools@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=aarch64" } } }, { "category": "product_version", "name": "httpd-tools-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "product": { "name": "httpd-tools-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "product_id": "httpd-tools-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-tools-debuginfo@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=aarch64" } } }, { "category": "product_version", "name": "mod_http2-0:1.11.3-2.module+el8.0.0+2969+90015743.aarch64", "product": { "name": "mod_http2-0:1.11.3-2.module+el8.0.0+2969+90015743.aarch64", "product_id": "mod_http2-0:1.11.3-2.module+el8.0.0+2969+90015743.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_http2@1.11.3-2.module%2Bel8.0.0%2B2969%2B90015743?arch=aarch64" } } }, { "category": "product_version", "name": "mod_http2-debuginfo-0:1.11.3-2.module+el8.0.0+2969+90015743.aarch64", "product": { "name": "mod_http2-debuginfo-0:1.11.3-2.module+el8.0.0+2969+90015743.aarch64", "product_id": "mod_http2-debuginfo-0:1.11.3-2.module+el8.0.0+2969+90015743.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_http2-debuginfo@1.11.3-2.module%2Bel8.0.0%2B2969%2B90015743?arch=aarch64" } } }, { "category": "product_version", "name": "mod_http2-debugsource-0:1.11.3-2.module+el8.0.0+2969+90015743.aarch64", "product": { "name": "mod_http2-debugsource-0:1.11.3-2.module+el8.0.0+2969+90015743.aarch64", "product_id": "mod_http2-debugsource-0:1.11.3-2.module+el8.0.0+2969+90015743.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_http2-debugsource@1.11.3-2.module%2Bel8.0.0%2B2969%2B90015743?arch=aarch64" } } }, { "category": "product_version", "name": "mod_ldap-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "product": { "name": "mod_ldap-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "product_id": "mod_ldap-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ldap@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=aarch64" } } }, { "category": "product_version", "name": "mod_ldap-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "product": { "name": "mod_ldap-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "product_id": "mod_ldap-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ldap-debuginfo@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=aarch64" } } }, { "category": "product_version", "name": "mod_md-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "product": { "name": "mod_md-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "product_id": "mod_md-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_md@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=aarch64" } } }, { "category": "product_version", "name": "mod_md-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "product": { "name": "mod_md-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "product_id": "mod_md-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_md-debuginfo@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=aarch64" } } }, { "category": "product_version", "name": "mod_proxy_html-1:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "product": { "name": "mod_proxy_html-1:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "product_id": "mod_proxy_html-1:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_proxy_html@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_proxy_html-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "product": { "name": "mod_proxy_html-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "product_id": "mod_proxy_html-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_proxy_html-debuginfo@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_session-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "product": { "name": "mod_session-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "product_id": "mod_session-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_session@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=aarch64" } } }, { "category": "product_version", "name": "mod_session-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "product": { "name": "mod_session-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "product_id": "mod_session-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_session-debuginfo@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=aarch64" } } }, { "category": "product_version", "name": "mod_ssl-1:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "product": { "name": "mod_ssl-1:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "product_id": "mod_ssl-1:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ssl@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_ssl-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "product": { "name": "mod_ssl-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "product_id": "mod_ssl-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ssl-debuginfo@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=aarch64\u0026epoch=1" } } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "httpd-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "product": { "name": "httpd-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "product_id": "httpd-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=ppc64le" } } }, { "category": "product_version", "name": "httpd-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "product": { "name": "httpd-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "product_id": "httpd-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-debuginfo@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=ppc64le" } } }, { "category": "product_version", "name": "httpd-debugsource-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "product": { "name": "httpd-debugsource-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "product_id": "httpd-debugsource-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-debugsource@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=ppc64le" } } }, { "category": "product_version", "name": "httpd-devel-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "product": { "name": "httpd-devel-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "product_id": "httpd-devel-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-devel@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=ppc64le" } } }, { "category": "product_version", "name": "httpd-tools-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "product": { "name": "httpd-tools-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "product_id": "httpd-tools-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-tools@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=ppc64le" } } }, { "category": "product_version", "name": "httpd-tools-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "product": { "name": "httpd-tools-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "product_id": "httpd-tools-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-tools-debuginfo@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=ppc64le" } } }, { "category": "product_version", "name": "mod_http2-0:1.11.3-2.module+el8.0.0+2969+90015743.ppc64le", "product": { "name": "mod_http2-0:1.11.3-2.module+el8.0.0+2969+90015743.ppc64le", "product_id": "mod_http2-0:1.11.3-2.module+el8.0.0+2969+90015743.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_http2@1.11.3-2.module%2Bel8.0.0%2B2969%2B90015743?arch=ppc64le" } } }, { "category": "product_version", "name": "mod_http2-debuginfo-0:1.11.3-2.module+el8.0.0+2969+90015743.ppc64le", "product": { "name": "mod_http2-debuginfo-0:1.11.3-2.module+el8.0.0+2969+90015743.ppc64le", "product_id": "mod_http2-debuginfo-0:1.11.3-2.module+el8.0.0+2969+90015743.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_http2-debuginfo@1.11.3-2.module%2Bel8.0.0%2B2969%2B90015743?arch=ppc64le" } } }, { "category": "product_version", "name": "mod_http2-debugsource-0:1.11.3-2.module+el8.0.0+2969+90015743.ppc64le", "product": { "name": "mod_http2-debugsource-0:1.11.3-2.module+el8.0.0+2969+90015743.ppc64le", "product_id": "mod_http2-debugsource-0:1.11.3-2.module+el8.0.0+2969+90015743.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_http2-debugsource@1.11.3-2.module%2Bel8.0.0%2B2969%2B90015743?arch=ppc64le" } } }, { "category": "product_version", "name": "mod_ldap-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "product": { "name": "mod_ldap-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "product_id": "mod_ldap-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ldap@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=ppc64le" } } }, { "category": "product_version", "name": "mod_ldap-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "product": { "name": "mod_ldap-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "product_id": "mod_ldap-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ldap-debuginfo@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=ppc64le" } } }, { "category": "product_version", "name": "mod_md-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "product": { "name": "mod_md-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "product_id": "mod_md-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_md@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=ppc64le" } } }, { "category": "product_version", "name": "mod_md-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "product": { "name": "mod_md-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "product_id": "mod_md-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_md-debuginfo@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=ppc64le" } } }, { "category": "product_version", "name": "mod_proxy_html-1:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "product": { "name": "mod_proxy_html-1:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "product_id": "mod_proxy_html-1:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_proxy_html@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_proxy_html-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "product": { "name": "mod_proxy_html-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "product_id": "mod_proxy_html-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_proxy_html-debuginfo@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_session-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "product": { "name": "mod_session-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "product_id": "mod_session-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_session@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=ppc64le" } } }, { "category": "product_version", "name": "mod_session-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "product": { "name": "mod_session-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "product_id": "mod_session-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_session-debuginfo@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=ppc64le" } } }, { "category": "product_version", "name": "mod_ssl-1:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "product": { "name": "mod_ssl-1:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "product_id": "mod_ssl-1:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ssl@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_ssl-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "product": { "name": "mod_ssl-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "product_id": "mod_ssl-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ssl-debuginfo@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=ppc64le\u0026epoch=1" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "httpd-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "product": { "name": "httpd-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "product_id": "httpd-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=x86_64" } } }, { "category": "product_version", "name": "httpd-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "product": { "name": "httpd-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "product_id": "httpd-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-debuginfo@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=x86_64" } } }, { "category": "product_version", "name": "httpd-debugsource-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "product": { "name": "httpd-debugsource-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "product_id": "httpd-debugsource-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-debugsource@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=x86_64" } } }, { "category": "product_version", "name": "httpd-devel-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "product": { "name": "httpd-devel-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "product_id": "httpd-devel-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-devel@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=x86_64" } } }, { "category": "product_version", "name": "httpd-tools-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "product": { "name": "httpd-tools-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "product_id": "httpd-tools-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-tools@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=x86_64" } } }, { "category": "product_version", "name": "httpd-tools-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "product": { "name": "httpd-tools-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "product_id": "httpd-tools-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-tools-debuginfo@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=x86_64" } } }, { "category": "product_version", "name": "mod_http2-0:1.11.3-2.module+el8.0.0+2969+90015743.x86_64", "product": { "name": "mod_http2-0:1.11.3-2.module+el8.0.0+2969+90015743.x86_64", "product_id": "mod_http2-0:1.11.3-2.module+el8.0.0+2969+90015743.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_http2@1.11.3-2.module%2Bel8.0.0%2B2969%2B90015743?arch=x86_64" } } }, { "category": "product_version", "name": "mod_http2-debuginfo-0:1.11.3-2.module+el8.0.0+2969+90015743.x86_64", "product": { "name": "mod_http2-debuginfo-0:1.11.3-2.module+el8.0.0+2969+90015743.x86_64", "product_id": "mod_http2-debuginfo-0:1.11.3-2.module+el8.0.0+2969+90015743.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_http2-debuginfo@1.11.3-2.module%2Bel8.0.0%2B2969%2B90015743?arch=x86_64" } } }, { "category": "product_version", "name": "mod_http2-debugsource-0:1.11.3-2.module+el8.0.0+2969+90015743.x86_64", "product": { "name": "mod_http2-debugsource-0:1.11.3-2.module+el8.0.0+2969+90015743.x86_64", "product_id": "mod_http2-debugsource-0:1.11.3-2.module+el8.0.0+2969+90015743.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_http2-debugsource@1.11.3-2.module%2Bel8.0.0%2B2969%2B90015743?arch=x86_64" } } }, { "category": "product_version", "name": "mod_ldap-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "product": { "name": "mod_ldap-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "product_id": "mod_ldap-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ldap@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=x86_64" } } }, { "category": "product_version", "name": "mod_ldap-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "product": { "name": "mod_ldap-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "product_id": "mod_ldap-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ldap-debuginfo@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=x86_64" } } }, { "category": "product_version", "name": "mod_md-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "product": { "name": "mod_md-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "product_id": "mod_md-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_md@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=x86_64" } } }, { "category": "product_version", "name": "mod_md-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "product": { "name": "mod_md-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "product_id": "mod_md-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_md-debuginfo@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=x86_64" } } }, { "category": "product_version", "name": "mod_proxy_html-1:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "product": { "name": "mod_proxy_html-1:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "product_id": "mod_proxy_html-1:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_proxy_html@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_proxy_html-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "product": { "name": "mod_proxy_html-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "product_id": "mod_proxy_html-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_proxy_html-debuginfo@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_session-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "product": { "name": "mod_session-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "product_id": "mod_session-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_session@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=x86_64" } } }, { "category": "product_version", "name": "mod_session-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "product": { "name": "mod_session-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "product_id": "mod_session-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_session-debuginfo@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=x86_64" } } }, { "category": "product_version", "name": "mod_ssl-1:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "product": { "name": "mod_ssl-1:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "product_id": "mod_ssl-1:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ssl@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "mod_ssl-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "product": { "name": "mod_ssl-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "product_id": "mod_ssl-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ssl-debuginfo@2.4.37-11.module%2Bel8.0.0%2B2969%2B90015743?arch=x86_64\u0026epoch=1" } } } ], "category": "architecture", "name": "x86_64" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5" }, "product_reference": "httpd:2.4:8000020190405071959:55190bc5", "relates_to_product_reference": "AppStream-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64 as a component of httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64" }, "product_reference": "httpd-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "relates_to_product_reference": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le as a component of httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le" }, "product_reference": "httpd-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "relates_to_product_reference": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x as a component of httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x" }, "product_reference": "httpd-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "relates_to_product_reference": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.37-11.module+el8.0.0+2969+90015743.src as a component of httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-0:2.4.37-11.module+el8.0.0+2969+90015743.src" }, "product_reference": "httpd-0:2.4.37-11.module+el8.0.0+2969+90015743.src", "relates_to_product_reference": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64 as a component of httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64" }, "product_reference": "httpd-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "relates_to_product_reference": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64 as a component of httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64" }, "product_reference": "httpd-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "relates_to_product_reference": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le as a component of httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le" }, "product_reference": "httpd-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "relates_to_product_reference": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x as a component of httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x" }, "product_reference": "httpd-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "relates_to_product_reference": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64 as a component of httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64" }, "product_reference": "httpd-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "relates_to_product_reference": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debugsource-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64 as a component of httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-debugsource-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64" }, "product_reference": "httpd-debugsource-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "relates_to_product_reference": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debugsource-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le as a component of httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-debugsource-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le" }, "product_reference": "httpd-debugsource-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "relates_to_product_reference": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debugsource-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x as a component of httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-debugsource-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x" }, "product_reference": "httpd-debugsource-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "relates_to_product_reference": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debugsource-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64 as a component of httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-debugsource-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64" }, "product_reference": "httpd-debugsource-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "relates_to_product_reference": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64 as a component of httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-devel-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64" }, "product_reference": "httpd-devel-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "relates_to_product_reference": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le as a component of httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-devel-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le" }, "product_reference": "httpd-devel-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "relates_to_product_reference": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x as a component of httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-devel-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x" }, "product_reference": "httpd-devel-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "relates_to_product_reference": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64 as a component of httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-devel-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64" }, "product_reference": "httpd-devel-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "relates_to_product_reference": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-filesystem-0:2.4.37-11.module+el8.0.0+2969+90015743.noarch as a component of httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-filesystem-0:2.4.37-11.module+el8.0.0+2969+90015743.noarch" }, "product_reference": "httpd-filesystem-0:2.4.37-11.module+el8.0.0+2969+90015743.noarch", "relates_to_product_reference": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-manual-0:2.4.37-11.module+el8.0.0+2969+90015743.noarch as a component of httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-manual-0:2.4.37-11.module+el8.0.0+2969+90015743.noarch" }, "product_reference": "httpd-manual-0:2.4.37-11.module+el8.0.0+2969+90015743.noarch", "relates_to_product_reference": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64 as a component of httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-tools-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64" }, "product_reference": "httpd-tools-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "relates_to_product_reference": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le as a component of httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-tools-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le" }, "product_reference": "httpd-tools-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "relates_to_product_reference": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x as a component of httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-tools-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x" }, "product_reference": "httpd-tools-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "relates_to_product_reference": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64 as a component of httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-tools-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64" }, "product_reference": "httpd-tools-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "relates_to_product_reference": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64 as a component of httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-tools-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64" }, "product_reference": "httpd-tools-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "relates_to_product_reference": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le as a component of httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-tools-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le" }, "product_reference": "httpd-tools-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "relates_to_product_reference": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x as a component of httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-tools-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x" }, "product_reference": "httpd-tools-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "relates_to_product_reference": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64 as a component of httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-tools-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64" }, "product_reference": "httpd-tools-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "relates_to_product_reference": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5" }, { "category": "default_component_of", "full_product_name": { "name": "mod_http2-0:1.11.3-2.module+el8.0.0+2969+90015743.aarch64 as a component of httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-0:1.11.3-2.module+el8.0.0+2969+90015743.aarch64" }, "product_reference": "mod_http2-0:1.11.3-2.module+el8.0.0+2969+90015743.aarch64", "relates_to_product_reference": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5" }, { "category": "default_component_of", "full_product_name": { "name": "mod_http2-0:1.11.3-2.module+el8.0.0+2969+90015743.ppc64le as a component of httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-0:1.11.3-2.module+el8.0.0+2969+90015743.ppc64le" }, "product_reference": "mod_http2-0:1.11.3-2.module+el8.0.0+2969+90015743.ppc64le", "relates_to_product_reference": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5" }, { "category": "default_component_of", "full_product_name": { "name": "mod_http2-0:1.11.3-2.module+el8.0.0+2969+90015743.s390x as a component of httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-0:1.11.3-2.module+el8.0.0+2969+90015743.s390x" }, "product_reference": "mod_http2-0:1.11.3-2.module+el8.0.0+2969+90015743.s390x", "relates_to_product_reference": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5" }, { "category": "default_component_of", "full_product_name": { "name": "mod_http2-0:1.11.3-2.module+el8.0.0+2969+90015743.src as a component of httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-0:1.11.3-2.module+el8.0.0+2969+90015743.src" }, "product_reference": "mod_http2-0:1.11.3-2.module+el8.0.0+2969+90015743.src", "relates_to_product_reference": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5" }, { "category": "default_component_of", "full_product_name": { "name": "mod_http2-0:1.11.3-2.module+el8.0.0+2969+90015743.x86_64 as a component of httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-0:1.11.3-2.module+el8.0.0+2969+90015743.x86_64" }, "product_reference": "mod_http2-0:1.11.3-2.module+el8.0.0+2969+90015743.x86_64", "relates_to_product_reference": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5" }, { "category": "default_component_of", "full_product_name": { "name": "mod_http2-debuginfo-0:1.11.3-2.module+el8.0.0+2969+90015743.aarch64 as a component of httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-debuginfo-0:1.11.3-2.module+el8.0.0+2969+90015743.aarch64" }, "product_reference": "mod_http2-debuginfo-0:1.11.3-2.module+el8.0.0+2969+90015743.aarch64", "relates_to_product_reference": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5" }, { "category": "default_component_of", "full_product_name": { "name": "mod_http2-debuginfo-0:1.11.3-2.module+el8.0.0+2969+90015743.ppc64le as a component of httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-debuginfo-0:1.11.3-2.module+el8.0.0+2969+90015743.ppc64le" }, "product_reference": "mod_http2-debuginfo-0:1.11.3-2.module+el8.0.0+2969+90015743.ppc64le", "relates_to_product_reference": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5" }, { "category": "default_component_of", "full_product_name": { "name": "mod_http2-debuginfo-0:1.11.3-2.module+el8.0.0+2969+90015743.s390x as a component of httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-debuginfo-0:1.11.3-2.module+el8.0.0+2969+90015743.s390x" }, "product_reference": "mod_http2-debuginfo-0:1.11.3-2.module+el8.0.0+2969+90015743.s390x", "relates_to_product_reference": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5" }, { "category": "default_component_of", "full_product_name": { "name": "mod_http2-debuginfo-0:1.11.3-2.module+el8.0.0+2969+90015743.x86_64 as a component of httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-debuginfo-0:1.11.3-2.module+el8.0.0+2969+90015743.x86_64" }, "product_reference": "mod_http2-debuginfo-0:1.11.3-2.module+el8.0.0+2969+90015743.x86_64", "relates_to_product_reference": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5" }, { "category": "default_component_of", "full_product_name": { "name": "mod_http2-debugsource-0:1.11.3-2.module+el8.0.0+2969+90015743.aarch64 as a component of httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-debugsource-0:1.11.3-2.module+el8.0.0+2969+90015743.aarch64" }, "product_reference": "mod_http2-debugsource-0:1.11.3-2.module+el8.0.0+2969+90015743.aarch64", "relates_to_product_reference": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5" }, { "category": "default_component_of", "full_product_name": { "name": "mod_http2-debugsource-0:1.11.3-2.module+el8.0.0+2969+90015743.ppc64le as a component of httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-debugsource-0:1.11.3-2.module+el8.0.0+2969+90015743.ppc64le" }, "product_reference": "mod_http2-debugsource-0:1.11.3-2.module+el8.0.0+2969+90015743.ppc64le", "relates_to_product_reference": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5" }, { "category": "default_component_of", "full_product_name": { "name": "mod_http2-debugsource-0:1.11.3-2.module+el8.0.0+2969+90015743.s390x as a component of httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-debugsource-0:1.11.3-2.module+el8.0.0+2969+90015743.s390x" }, "product_reference": "mod_http2-debugsource-0:1.11.3-2.module+el8.0.0+2969+90015743.s390x", "relates_to_product_reference": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5" }, { "category": "default_component_of", "full_product_name": { "name": "mod_http2-debugsource-0:1.11.3-2.module+el8.0.0+2969+90015743.x86_64 as a component of httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-debugsource-0:1.11.3-2.module+el8.0.0+2969+90015743.x86_64" }, "product_reference": "mod_http2-debugsource-0:1.11.3-2.module+el8.0.0+2969+90015743.x86_64", "relates_to_product_reference": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64 as a component of httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ldap-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64" }, "product_reference": "mod_ldap-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "relates_to_product_reference": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le as a component of httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ldap-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le" }, "product_reference": "mod_ldap-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "relates_to_product_reference": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x as a component of httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ldap-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x" }, "product_reference": "mod_ldap-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "relates_to_product_reference": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64 as a component of httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ldap-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64" }, "product_reference": "mod_ldap-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "relates_to_product_reference": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64 as a component of httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ldap-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64" }, "product_reference": "mod_ldap-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "relates_to_product_reference": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le as a component of httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ldap-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le" }, "product_reference": "mod_ldap-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "relates_to_product_reference": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x as a component of httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ldap-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x" }, "product_reference": "mod_ldap-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "relates_to_product_reference": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ldap-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64 as a component of httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ldap-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64" }, "product_reference": "mod_ldap-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "relates_to_product_reference": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5" }, { "category": "default_component_of", "full_product_name": { "name": "mod_md-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64 as a component of httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_md-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64" }, "product_reference": "mod_md-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "relates_to_product_reference": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5" }, { "category": "default_component_of", "full_product_name": { "name": "mod_md-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le as a component of httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_md-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le" }, "product_reference": "mod_md-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "relates_to_product_reference": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5" }, { "category": "default_component_of", "full_product_name": { "name": "mod_md-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x as a component of httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_md-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x" }, "product_reference": "mod_md-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "relates_to_product_reference": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5" }, { "category": "default_component_of", "full_product_name": { "name": "mod_md-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64 as a component of httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_md-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64" }, "product_reference": "mod_md-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "relates_to_product_reference": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5" }, { "category": "default_component_of", "full_product_name": { "name": "mod_md-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64 as a component of httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_md-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64" }, "product_reference": "mod_md-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "relates_to_product_reference": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5" }, { "category": "default_component_of", "full_product_name": { "name": "mod_md-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le as a component of httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_md-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le" }, "product_reference": "mod_md-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "relates_to_product_reference": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5" }, { "category": "default_component_of", "full_product_name": { "name": "mod_md-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x as a component of httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_md-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x" }, "product_reference": "mod_md-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "relates_to_product_reference": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5" }, { "category": "default_component_of", "full_product_name": { "name": "mod_md-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64 as a component of httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_md-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64" }, "product_reference": "mod_md-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "relates_to_product_reference": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-1:2.4.37-11.module+el8.0.0+2969+90015743.aarch64 as a component of httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_proxy_html-1:2.4.37-11.module+el8.0.0+2969+90015743.aarch64" }, "product_reference": "mod_proxy_html-1:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "relates_to_product_reference": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-1:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le as a component of httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_proxy_html-1:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le" }, "product_reference": "mod_proxy_html-1:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "relates_to_product_reference": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-1:2.4.37-11.module+el8.0.0+2969+90015743.s390x as a component of httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_proxy_html-1:2.4.37-11.module+el8.0.0+2969+90015743.s390x" }, "product_reference": "mod_proxy_html-1:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "relates_to_product_reference": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-1:2.4.37-11.module+el8.0.0+2969+90015743.x86_64 as a component of httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_proxy_html-1:2.4.37-11.module+el8.0.0+2969+90015743.x86_64" }, "product_reference": "mod_proxy_html-1:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "relates_to_product_reference": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.aarch64 as a component of httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_proxy_html-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.aarch64" }, "product_reference": "mod_proxy_html-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "relates_to_product_reference": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le as a component of httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_proxy_html-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le" }, "product_reference": "mod_proxy_html-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "relates_to_product_reference": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.s390x as a component of httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_proxy_html-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.s390x" }, "product_reference": "mod_proxy_html-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "relates_to_product_reference": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5" }, { "category": "default_component_of", "full_product_name": { "name": "mod_proxy_html-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.x86_64 as a component of httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_proxy_html-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.x86_64" }, "product_reference": "mod_proxy_html-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "relates_to_product_reference": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64 as a component of httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_session-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64" }, "product_reference": "mod_session-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "relates_to_product_reference": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le as a component of httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_session-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le" }, "product_reference": "mod_session-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "relates_to_product_reference": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x as a component of httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_session-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x" }, "product_reference": "mod_session-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "relates_to_product_reference": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64 as a component of httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_session-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64" }, "product_reference": "mod_session-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "relates_to_product_reference": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64 as a component of httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_session-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64" }, "product_reference": "mod_session-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "relates_to_product_reference": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le as a component of httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_session-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le" }, "product_reference": "mod_session-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "relates_to_product_reference": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x as a component of httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_session-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x" }, "product_reference": "mod_session-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "relates_to_product_reference": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5" }, { "category": "default_component_of", "full_product_name": { "name": "mod_session-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64 as a component of httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_session-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64" }, "product_reference": "mod_session-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "relates_to_product_reference": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.4.37-11.module+el8.0.0+2969+90015743.aarch64 as a component of httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ssl-1:2.4.37-11.module+el8.0.0+2969+90015743.aarch64" }, "product_reference": "mod_ssl-1:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "relates_to_product_reference": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le as a component of httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ssl-1:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le" }, "product_reference": "mod_ssl-1:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "relates_to_product_reference": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.4.37-11.module+el8.0.0+2969+90015743.s390x as a component of httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ssl-1:2.4.37-11.module+el8.0.0+2969+90015743.s390x" }, "product_reference": "mod_ssl-1:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "relates_to_product_reference": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.4.37-11.module+el8.0.0+2969+90015743.x86_64 as a component of httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ssl-1:2.4.37-11.module+el8.0.0+2969+90015743.x86_64" }, "product_reference": "mod_ssl-1:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "relates_to_product_reference": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.aarch64 as a component of httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ssl-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.aarch64" }, "product_reference": "mod_ssl-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "relates_to_product_reference": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le as a component of httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ssl-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le" }, "product_reference": "mod_ssl-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "relates_to_product_reference": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.s390x as a component of httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ssl-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.s390x" }, "product_reference": "mod_ssl-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "relates_to_product_reference": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.x86_64 as a component of httpd:2.4:8000020190405071959:55190bc5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ssl-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.x86_64" }, "product_reference": "mod_ssl-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "relates_to_product_reference": "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5" } ] }, "vulnerabilities": [ { "cve": "CVE-2019-0211", "cwe": { "id": "CWE-250", "name": "Execution with Unnecessary Privileges" }, "discovery_date": "2019-04-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1694980" } ], "notes": [ { "category": "description", "text": "A flaw was found in Apache where code executing in a less-privileged child process or thread could execute arbitrary code with the privilege of the parent process (usually root). An attacker having access to run arbitrary scripts on the web server (PHP, CGI etc) could use this flaw to run code on the web server with root privileges.", "title": "Vulnerability description" }, { "category": "summary", "text": "httpd: privilege escalation from modules scripts", "title": "Vulnerability summary" }, { "category": "other", "text": "This flaw is exploitable in httpd if it is configured to allow an untrusted user to upload and execute arbitrary scripts. Due to the nature of the flaw, the uploaded script would not run as a restricted privileged user, but rather it runs as root allowing for privilege escalation from the restricted user to root on the web server. \n\nDepending on the configuration of the server, you would need local (AV:L) privileges to place the script or network (AV:N) privileges if the server ran an application that permitted uploading scripts directly. The latter scenario is not common for unauthenticated users. Once the attacker can place the script somewhere in the web root where it can be easily exploited (AC:L). This type of setup is more common in shared hosted environments (PR:L) and would allow an attacker with access to a site on the shared hosted to impact the confidentiality, integrity, and availability (CIA:H) with no interaction (UI:N). Due to the elevated privileges obtained, there is an impact to the system beyond the web server itself (S:C).", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-0:2.4.37-11.module+el8.0.0+2969+90015743.src", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-debugsource-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-debugsource-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-debugsource-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-debugsource-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-devel-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-devel-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-devel-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-devel-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-filesystem-0:2.4.37-11.module+el8.0.0+2969+90015743.noarch", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-manual-0:2.4.37-11.module+el8.0.0+2969+90015743.noarch", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-tools-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-tools-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-tools-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-tools-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-tools-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-tools-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-tools-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-tools-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-0:1.11.3-2.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-0:1.11.3-2.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-0:1.11.3-2.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-0:1.11.3-2.module+el8.0.0+2969+90015743.src", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-0:1.11.3-2.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-debuginfo-0:1.11.3-2.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-debuginfo-0:1.11.3-2.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-debuginfo-0:1.11.3-2.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-debuginfo-0:1.11.3-2.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-debugsource-0:1.11.3-2.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-debugsource-0:1.11.3-2.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-debugsource-0:1.11.3-2.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-debugsource-0:1.11.3-2.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ldap-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ldap-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ldap-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ldap-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ldap-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ldap-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ldap-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ldap-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_md-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_md-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_md-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_md-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_md-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_md-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_md-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_md-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_proxy_html-1:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_proxy_html-1:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_proxy_html-1:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_proxy_html-1:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_proxy_html-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_proxy_html-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_proxy_html-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_proxy_html-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_session-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_session-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_session-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_session-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_session-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_session-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_session-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_session-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ssl-1:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ssl-1:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ssl-1:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ssl-1:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ssl-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ssl-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ssl-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ssl-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-0211" }, { "category": "external", "summary": "RHBZ#1694980", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1694980" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-0211", "url": "https://www.cve.org/CVERecord?id=CVE-2019-0211" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-0211", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-0211" }, { "category": "external", "summary": "http://www.apache.org/dist/httpd/CHANGES_2.4", "url": "http://www.apache.org/dist/httpd/CHANGES_2.4" }, { "category": "external", "summary": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2019-0211", "url": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2019-0211" }, { "category": "external", "summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog", "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog" } ], "release_date": "2019-04-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-05-07T04:19:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically.", "product_ids": [ "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-0:2.4.37-11.module+el8.0.0+2969+90015743.src", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-debugsource-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-debugsource-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-debugsource-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-debugsource-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-devel-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-devel-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-devel-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-devel-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-filesystem-0:2.4.37-11.module+el8.0.0+2969+90015743.noarch", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-manual-0:2.4.37-11.module+el8.0.0+2969+90015743.noarch", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-tools-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-tools-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-tools-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-tools-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-tools-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-tools-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-tools-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-tools-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-0:1.11.3-2.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-0:1.11.3-2.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-0:1.11.3-2.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-0:1.11.3-2.module+el8.0.0+2969+90015743.src", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-0:1.11.3-2.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-debuginfo-0:1.11.3-2.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-debuginfo-0:1.11.3-2.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-debuginfo-0:1.11.3-2.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-debuginfo-0:1.11.3-2.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-debugsource-0:1.11.3-2.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-debugsource-0:1.11.3-2.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-debugsource-0:1.11.3-2.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-debugsource-0:1.11.3-2.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ldap-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ldap-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ldap-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ldap-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ldap-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ldap-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ldap-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ldap-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_md-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_md-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_md-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_md-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_md-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_md-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_md-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_md-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_proxy_html-1:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_proxy_html-1:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_proxy_html-1:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_proxy_html-1:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_proxy_html-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_proxy_html-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_proxy_html-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_proxy_html-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_session-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_session-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_session-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_session-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_session-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_session-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_session-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_session-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ssl-1:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ssl-1:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ssl-1:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ssl-1:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ssl-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ssl-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ssl-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ssl-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:0980" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H", "version": "3.0" }, "products": [ "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-0:2.4.37-11.module+el8.0.0+2969+90015743.src", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-debugsource-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-debugsource-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-debugsource-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-debugsource-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-devel-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-devel-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-devel-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-devel-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-filesystem-0:2.4.37-11.module+el8.0.0+2969+90015743.noarch", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-manual-0:2.4.37-11.module+el8.0.0+2969+90015743.noarch", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-tools-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-tools-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-tools-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-tools-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-tools-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-tools-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-tools-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-tools-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-0:1.11.3-2.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-0:1.11.3-2.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-0:1.11.3-2.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-0:1.11.3-2.module+el8.0.0+2969+90015743.src", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-0:1.11.3-2.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-debuginfo-0:1.11.3-2.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-debuginfo-0:1.11.3-2.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-debuginfo-0:1.11.3-2.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-debuginfo-0:1.11.3-2.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-debugsource-0:1.11.3-2.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-debugsource-0:1.11.3-2.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-debugsource-0:1.11.3-2.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-debugsource-0:1.11.3-2.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ldap-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ldap-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ldap-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ldap-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ldap-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ldap-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ldap-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ldap-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_md-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_md-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_md-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_md-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_md-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_md-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_md-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_md-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_proxy_html-1:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_proxy_html-1:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_proxy_html-1:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_proxy_html-1:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_proxy_html-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_proxy_html-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_proxy_html-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_proxy_html-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_session-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_session-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_session-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_session-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_session-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_session-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_session-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_session-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ssl-1:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ssl-1:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ssl-1:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ssl-1:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ssl-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ssl-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ssl-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ssl-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.x86_64" ] } ], "threats": [ { "category": "exploit_status", "date": "2021-11-03T00:00:00+00:00", "details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog" }, { "category": "impact", "details": "Important" } ], "title": "httpd: privilege escalation from modules scripts" }, { "cve": "CVE-2019-0215", "cwe": { "id": "CWE-284", "name": "Improper Access Control" }, "discovery_date": "2019-04-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1695025" } ], "notes": [ { "category": "description", "text": "A flaw was found in Apache HTTP Server 2.4 (releases 2.4.37 and 2.4.38). A bug in mod_ssl, when using per-location client certificate verification with TLSv1.3, allowed a client supporting Post-Handshake Authentication to bypass configured access control restrictions. An attacker could perform various unauthorized actions after bypassing the restrictions. The highest threat from this vulnerability is to data confidentiality and integrity.", "title": "Vulnerability description" }, { "category": "summary", "text": "httpd: mod_ssl: access control bypass when using per-location client certification authentication", "title": "Vulnerability summary" }, { "category": "other", "text": "This flaw can be exploited for httpd configurations where per-location client certificates are enabled and TLS 1.3 is used. \n\nThe attacker can remotely exploit this httpd flaw (AV:N). However the server had to be configured to use per-location client certificate and the attacker needs to have access to the authenticating client certificate (AC:H). No other significant privileges are required by the attacker (PR:L). The result of the attack is bypass of the configured access control restrictions (CI:H). This however does not affect the system beyond the web server itself (S:U).", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-0:2.4.37-11.module+el8.0.0+2969+90015743.src", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-debugsource-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-debugsource-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-debugsource-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-debugsource-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-devel-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-devel-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-devel-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-devel-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-filesystem-0:2.4.37-11.module+el8.0.0+2969+90015743.noarch", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-manual-0:2.4.37-11.module+el8.0.0+2969+90015743.noarch", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-tools-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-tools-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-tools-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-tools-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-tools-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-tools-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-tools-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-tools-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-0:1.11.3-2.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-0:1.11.3-2.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-0:1.11.3-2.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-0:1.11.3-2.module+el8.0.0+2969+90015743.src", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-0:1.11.3-2.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-debuginfo-0:1.11.3-2.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-debuginfo-0:1.11.3-2.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-debuginfo-0:1.11.3-2.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-debuginfo-0:1.11.3-2.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-debugsource-0:1.11.3-2.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-debugsource-0:1.11.3-2.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-debugsource-0:1.11.3-2.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-debugsource-0:1.11.3-2.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ldap-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ldap-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ldap-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ldap-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ldap-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ldap-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ldap-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ldap-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_md-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_md-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_md-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_md-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_md-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_md-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_md-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_md-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_proxy_html-1:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_proxy_html-1:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_proxy_html-1:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_proxy_html-1:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_proxy_html-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_proxy_html-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_proxy_html-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_proxy_html-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_session-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_session-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_session-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_session-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_session-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_session-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_session-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_session-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ssl-1:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ssl-1:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ssl-1:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ssl-1:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ssl-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ssl-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ssl-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ssl-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-0215" }, { "category": "external", "summary": "RHBZ#1695025", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1695025" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-0215", "url": "https://www.cve.org/CVERecord?id=CVE-2019-0215" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-0215", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-0215" }, { "category": "external", "summary": "http://www.apache.org/dist/httpd/CHANGES_2.4", "url": "http://www.apache.org/dist/httpd/CHANGES_2.4" }, { "category": "external", "summary": "https://httpd.apache.org/security/vulnerabilities_24.html", "url": "https://httpd.apache.org/security/vulnerabilities_24.html" } ], "release_date": "2019-04-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-05-07T04:19:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically.", "product_ids": [ "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-0:2.4.37-11.module+el8.0.0+2969+90015743.src", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-debugsource-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-debugsource-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-debugsource-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-debugsource-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-devel-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-devel-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-devel-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-devel-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-filesystem-0:2.4.37-11.module+el8.0.0+2969+90015743.noarch", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-manual-0:2.4.37-11.module+el8.0.0+2969+90015743.noarch", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-tools-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-tools-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-tools-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-tools-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-tools-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-tools-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-tools-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-tools-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-0:1.11.3-2.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-0:1.11.3-2.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-0:1.11.3-2.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-0:1.11.3-2.module+el8.0.0+2969+90015743.src", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-0:1.11.3-2.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-debuginfo-0:1.11.3-2.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-debuginfo-0:1.11.3-2.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-debuginfo-0:1.11.3-2.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-debuginfo-0:1.11.3-2.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-debugsource-0:1.11.3-2.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-debugsource-0:1.11.3-2.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-debugsource-0:1.11.3-2.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-debugsource-0:1.11.3-2.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ldap-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ldap-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ldap-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ldap-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ldap-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ldap-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ldap-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ldap-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_md-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_md-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_md-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_md-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_md-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_md-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_md-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_md-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_proxy_html-1:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_proxy_html-1:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_proxy_html-1:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_proxy_html-1:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_proxy_html-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_proxy_html-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_proxy_html-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_proxy_html-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_session-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_session-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_session-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_session-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_session-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_session-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_session-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_session-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ssl-1:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ssl-1:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ssl-1:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ssl-1:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ssl-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ssl-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ssl-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ssl-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:0980" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N", "version": "3.0" }, "products": [ "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-0:2.4.37-11.module+el8.0.0+2969+90015743.src", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-debugsource-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-debugsource-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-debugsource-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-debugsource-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-devel-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-devel-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-devel-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-devel-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-filesystem-0:2.4.37-11.module+el8.0.0+2969+90015743.noarch", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-manual-0:2.4.37-11.module+el8.0.0+2969+90015743.noarch", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-tools-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-tools-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-tools-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-tools-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-tools-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-tools-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-tools-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:httpd-tools-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-0:1.11.3-2.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-0:1.11.3-2.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-0:1.11.3-2.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-0:1.11.3-2.module+el8.0.0+2969+90015743.src", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-0:1.11.3-2.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-debuginfo-0:1.11.3-2.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-debuginfo-0:1.11.3-2.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-debuginfo-0:1.11.3-2.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-debuginfo-0:1.11.3-2.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-debugsource-0:1.11.3-2.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-debugsource-0:1.11.3-2.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-debugsource-0:1.11.3-2.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_http2-debugsource-0:1.11.3-2.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ldap-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ldap-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ldap-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ldap-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ldap-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ldap-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ldap-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ldap-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_md-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_md-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_md-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_md-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_md-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_md-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_md-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_md-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_proxy_html-1:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_proxy_html-1:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_proxy_html-1:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_proxy_html-1:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_proxy_html-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_proxy_html-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_proxy_html-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_proxy_html-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_session-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_session-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_session-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_session-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_session-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_session-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_session-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_session-debuginfo-0:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ssl-1:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ssl-1:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ssl-1:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ssl-1:2.4.37-11.module+el8.0.0+2969+90015743.x86_64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ssl-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.aarch64", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ssl-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.ppc64le", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ssl-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.s390x", "AppStream-8.0.0.Z:httpd:2.4:8000020190405071959:55190bc5:mod_ssl-debuginfo-1:2.4.37-11.module+el8.0.0+2969+90015743.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "httpd: mod_ssl: access control bypass when using per-location client certification authentication" } ] }
WID-SEC-W-2023-2047
Vulnerability from csaf_certbund
Published
2019-04-02 22:00
Modified
2023-08-13 22:00
Summary
Apache HTTP Server: Mehrere Schwachstellen
Notes
Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.
Produktbeschreibung
Apache ist ein Webserver für verschiedene Plattformen.
Angriff
Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann mehrere Schwachstellen im Apache HTTP Server ausnutzen, um seine Rechte zu erweitern, Sicherheitsrestriktionen zu umgehen oder um einen Denial of Service Angriff durchzuführen.
Betroffene Betriebssysteme
- UNIX
- Linux
- Windows
- NetApp Appliance
{ "document": { "aggregate_severity": { "text": "hoch" }, "category": "csaf_base", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "de-DE", "notes": [ { "category": "legal_disclaimer", "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen." }, { "category": "description", "text": "Apache ist ein Webserver f\u00fcr verschiedene Plattformen.", "title": "Produktbeschreibung" }, { "category": "summary", "text": "Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann mehrere Schwachstellen im Apache HTTP Server ausnutzen, um seine Rechte zu erweitern, Sicherheitsrestriktionen zu umgehen oder um einen Denial of Service Angriff durchzuf\u00fchren.", "title": "Angriff" }, { "category": "general", "text": "- UNIX\n- Linux\n- Windows\n- NetApp Appliance", "title": "Betroffene Betriebssysteme" } ], "publisher": { "category": "other", "contact_details": "csaf-provider@cert-bund.de", "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik", "namespace": "https://www.bsi.bund.de" }, "references": [ { "category": "self", "summary": "WID-SEC-W-2023-2047 - CSAF Version", "url": "https://wid.cert-bund.de/.well-known/csaf/white/2019/wid-sec-w-2023-2047.json" }, { "category": "self", "summary": "WID-SEC-2023-2047 - Portal Version", "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2023-2047" }, { "category": "external", "summary": "HPE Securi+y Bulletin", "url": "https://support.hpe.com/hpesc/public/docDisplay?docId=emr_na-hpesbst04494en_us" }, { "category": "external", "summary": "Eintr\u00e4ge in der OSS Mailing Liste vom 2019-04-02", "url": "https://seclists.org/oss-sec/2019/q2/0" }, { "category": "external", "summary": "Eintr\u00e4ge in der OSS Mailing Liste vom 2019-04-02", "url": "https://seclists.org/oss-sec/2019/q2/1" }, { "category": "external", "summary": "Eintr\u00e4ge in der OSS Mailing Liste vom 2019-04-02", "url": "https://seclists.org/oss-sec/2019/q2/2" }, { "category": "external", "summary": "Eintr\u00e4ge in der OSS Mailing Liste vom 2019-04-02", "url": "https://seclists.org/oss-sec/2019/q2/3" }, { "category": "external", "summary": "Eintr\u00e4ge in der OSS Mailing Liste vom 2019-04-02", "url": "https://seclists.org/oss-sec/2019/q2/4" }, { "category": "external", "summary": "Eintr\u00e4ge in der OSS Mailing Liste vom 2019-04-02", "url": "https://seclists.org/oss-sec/2019/q2/5" }, { "category": "external", "summary": "Apache Release Notes Stand 2019-04-02", "url": "https://httpd.apache.org/security/vulnerabilities_24.html" }, { "category": "external", "summary": "Debian Security Advisory DSA-4422 vom 2019-04-04 vom 2019-04-03", "url": "https://lists.debian.org/debian-security-announce/2019/msg00066.html" }, { "category": "external", "summary": "Ubuntu Security Notices USN-3937-1 vom 2019-04-04", "url": "https://usn.ubuntu.com/3937-1/" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2019:0878-1 vom 2019-04-04", "url": "https://www.suse.com/de-de/support/update/announcement/2019/suse-su-20190878-1/" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2019:0873-1 vom 2019-04-04", "url": "http://lists.suse.com/pipermail/sle-security-updates/2019-April/005295.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2019:0889-1 vom 2019-04-05", "url": "https://www.suse.com/support/update/announcement/2019/suse-su-20190889-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2019:0888-1 vom 2019-04-05", "url": "https://www.suse.com/support/update/announcement/2019/suse-su-20190888-1.html" }, { "category": "external", "summary": "Ubuntu Security Notice USN-3937-2 vom 2019-04-10", "url": "https://usn.ubuntu.com/3937-2/" }, { "category": "external", "summary": "Arch Linux Security Advisory ASA-201904-3 vom 2019-04-05", "url": "https://security.archlinux.org/ASA-201904-3" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2019:0746 vom 2019-04-11", "url": "https://access.redhat.com/errata/RHSA-2019:0746" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2019:0888-2 vom 2019-04-12", "url": "https://www.suse.com/support/update/announcement/2019/suse-su-20190888-2.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2020:0251 vom 2020-01-27", "url": "https://access.redhat.com/errata/RHSA-2020:0251" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2020:0250 vom 2020-01-27", "url": "https://access.redhat.com/errata/RHSA-2020:0250" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2019:0980 vom 2019-05-07", "url": "https://access.redhat.com/errata/RHSA-2019:0980" }, { "category": "external", "summary": "Exploit f\u00fcr CVE-2019-0211 vom 2019-05-16", "url": "https://github.com/cfreal/exploits/tree/master/CVE-2019-0211-apache" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2019:1296 vom 2019-05-30", "url": "https://access.redhat.com/errata/RHSA-2019:1296" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2019:1297 vom 2019-05-30", "url": "https://access.redhat.com/errata/RHSA-2019:1297" }, { "category": "external", "summary": "NetApp Security Advisory NTAP-20190423-0001 vom 2019-06-06", "url": "https://security.netapp.com/advisory/ntap-20190423-0001/" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2019:1543 vom 2019-06-19", "url": "https://access.redhat.com/errata/RHSA-2019:1543" }, { "category": "external", "summary": "NetApp Security Advisory NTAP-20190625-0007 vom 2019-06-25", "url": "https://security.netapp.com/advisory/ntap-20190625-0007/" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2019:2343 vom 2019-08-06", "url": "https://access.redhat.com/errata/RHSA-2019:2343" }, { "category": "external", "summary": "HP SECURITY BULLETIN hpesbux03950en_us vom 2019-08-22", "url": "https://support.hpe.com/hpsc/doc/public/display?docId=hpesbux03950en_us" }, { "category": "external", "summary": "Ubuntu Security Notice USN-4113-1 vom 2019-08-30", "url": "https://usn.ubuntu.com/4113-1/" }, { "category": "external", "summary": "Ubuntu Security Notice USN-4113-2 vom 2019-09-17", "url": "https://usn.ubuntu.com/4113-2/" }, { "category": "external", "summary": "CentOS Security Advisory CESA-2019:2343 vom 2019-09-18", "url": "http://centos-announce.2309468.n4.nabble.com/CentOS-announce-CESA-2019-2343-Moderate-CentOS-7-httpd-Security-Update-tp4645680.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2019:3436 vom 2019-11-05", "url": "https://access.redhat.com/errata/RHSA-2019:3436" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2019:3933 vom 2019-11-20", "url": "https://access.redhat.com/errata/RHSA-2019:3933" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2019:3935 vom 2019-11-20", "url": "https://access.redhat.com/errata/RHSA-2019:3935" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2019:3932 vom 2019-11-20", "url": "https://access.redhat.com/errata/RHSA-2019:3932" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2019:4126 vom 2019-12-10", "url": "https://access.redhat.com/errata/RHSA-2019:4126" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2020:2644 vom 2020-06-22", "url": "https://access.redhat.com/errata/RHSA-2020:2644" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2020:2646 vom 2020-06-22", "url": "https://access.redhat.com/errata/RHSA-2020:2646" }, { "category": "external", "summary": "Juniper Security Advisory JSA11023 vom 2020-07-08", "url": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA11023" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2020:4751 vom 2020-11-04", "url": "https://access.redhat.com/errata/RHSA-2020:4751" }, { "category": "external", "summary": "AVAYA Security Advisory ASA-2020-161 vom 2020-12-08", "url": "https://downloads.avaya.com/css/P8/documents/101072834" } ], "source_lang": "en-US", "title": "Apache HTTP Server: Mehrere Schwachstellen", "tracking": { "current_release_date": "2023-08-13T22:00:00.000+00:00", "generator": { "date": "2024-02-15T17:40:20.256+00:00", "engine": { "name": "BSI-WID", "version": "1.3.0" } }, "id": "WID-SEC-W-2023-2047", "initial_release_date": "2019-04-02T22:00:00.000+00:00", "revision_history": [ { "date": "2019-04-02T22:00:00.000+00:00", "number": "1", "summary": "Initiale Fassung" }, { "date": "2019-04-03T22:00:00.000+00:00", "number": "2", "summary": "Neue Updates von Debian und Fedora aufgenommen" }, { "date": "2019-04-04T22:00:00.000+00:00", "number": "3", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2019-04-04T22:00:00.000+00:00", "number": "4", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2019-04-04T22:00:00.000+00:00", "number": "5", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2019-04-07T22:00:00.000+00:00", "number": "6", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2019-04-10T22:00:00.000+00:00", "number": "7", "summary": "Neue Updates von Ubuntu und Arch Linux aufgenommen" }, { "date": "2019-04-11T22:00:00.000+00:00", "number": "8", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2019-04-14T22:00:00.000+00:00", "number": "9", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2019-04-22T22:00:00.000+00:00", "number": "10", "summary": "Referenz(en) aufgenommen: GLSA/201904-20" }, { "date": "2019-05-06T22:00:00.000+00:00", "number": "11", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2019-05-16T22:00:00.000+00:00", "number": "12", "summary": "Exploit aufgenommen" }, { "date": "2019-05-23T22:00:00.000+00:00", "number": "13", "summary": "Referenz(en) aufgenommen: FEDORA-2019-B99E48E883, FEDORA-2019-08E57D15FD" }, { "date": "2019-05-30T22:00:00.000+00:00", "number": "14", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2019-05-30T22:00:00.000+00:00", "number": "15", "summary": "Referenz(en) aufgenommen: FEDORA-2019-C7187E6DC7" }, { "date": "2019-06-02T22:00:00.000+00:00", "number": "16", "summary": "Schreibfehler korrigiert" }, { "date": "2019-06-06T22:00:00.000+00:00", "number": "17", "summary": "Neue Updates von NetApp aufgenommen" }, { "date": "2019-06-18T22:00:00.000+00:00", "number": "18", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2019-06-24T22:00:00.000+00:00", "number": "19", "summary": "Neue Updates von NetApp aufgenommen" }, { "date": "2019-08-06T22:00:00.000+00:00", "number": "20", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2019-08-25T22:00:00.000+00:00", "number": "21", "summary": "Neue Updates von HP aufgenommen" }, { "date": "2019-08-29T22:00:00.000+00:00", "number": "22", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2019-09-17T22:00:00.000+00:00", "number": "23", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2019-09-18T22:00:00.000+00:00", "number": "24", "summary": "Neue Updates von CentOS aufgenommen" }, { "date": "2019-11-05T23:00:00.000+00:00", "number": "25", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2019-11-20T23:00:00.000+00:00", "number": "26", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2019-12-09T23:00:00.000+00:00", "number": "27", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2020-01-27T23:00:00.000+00:00", "number": "28", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2020-06-22T22:00:00.000+00:00", "number": "29", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2020-07-08T22:00:00.000+00:00", "number": "30", "summary": "Neue Updates von Juniper aufgenommen" }, { "date": "2020-11-03T23:00:00.000+00:00", "number": "31", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2020-12-09T23:00:00.000+00:00", "number": "32", "summary": "Neue Updates von AVAYA aufgenommen" }, { "date": "2023-08-13T22:00:00.000+00:00", "number": "33", "summary": "Neue Updates von HP aufgenommen" } ], "status": "final", "version": "33" } }, "product_tree": { "branches": [ { "branches": [ { "category": "product_name", "name": "Apache HTTP Server \u003c 2.4.39", "product": { "name": "Apache HTTP Server \u003c 2.4.39", "product_id": "T013862", "product_identification_helper": { "cpe": "cpe:/a:apache:http_server:2.4.39" } } } ], "category": "vendor", "name": "Apache" }, { "branches": [ { "category": "product_name", "name": "Avaya Aura Experience Portal", "product": { "name": "Avaya Aura Experience Portal", "product_id": "T015519", "product_identification_helper": { "cpe": "cpe:/a:avaya:aura_experience_portal:-" } } } ], "category": "vendor", "name": "Avaya" }, { "branches": [ { "category": "product_name", "name": "Broadcom Brocade Switch", "product": { "name": "Broadcom Brocade Switch", "product_id": "T015844", "product_identification_helper": { "cpe": "cpe:/h:brocade:switch:-" } } } ], "category": "vendor", "name": "Broadcom" }, { "branches": [ { "category": "product_name", "name": "Debian Linux", "product": { "name": "Debian Linux", "product_id": "2951", "product_identification_helper": { "cpe": "cpe:/o:debian:debian_linux:-" } } } ], "category": "vendor", "name": "Debian" }, { "branches": [ { "category": "product_name", "name": "HPE HP-UX", "product": { "name": "HPE HP-UX", "product_id": "4871", "product_identification_helper": { "cpe": "cpe:/o:hp:hp-ux:-" } } }, { "category": "product_name", "name": "HPE Switch", "product": { "name": "HPE Switch", "product_id": "T005119", "product_identification_helper": { "cpe": "cpe:/h:hp:switch:-" } } } ], "category": "vendor", "name": "HPE" }, { "branches": [ { "category": "product_name", "name": "Juniper Junos Space \u003c 20.1R1", "product": { "name": "Juniper Junos Space \u003c 20.1R1", "product_id": "T016874", "product_identification_helper": { "cpe": "cpe:/a:juniper:junos_space:20.1r1" } } } ], "category": "vendor", "name": "Juniper" }, { "branches": [ { "category": "product_name", "name": "NetApp Data ONTAP", "product": { "name": "NetApp Data ONTAP", "product_id": "7654", "product_identification_helper": { "cpe": "cpe:/a:netapp:data_ontap:-" } } } ], "category": "vendor", "name": "NetApp" }, { "branches": [ { "category": "product_name", "name": "Open Source Arch Linux", "product": { "name": "Open Source Arch Linux", "product_id": "T013312", "product_identification_helper": { "cpe": "cpe:/o:archlinux:archlinux:-" } } }, { "category": "product_name", "name": "Open Source CentOS", "product": { "name": "Open Source CentOS", "product_id": "1727", "product_identification_helper": { "cpe": "cpe:/o:centos:centos:-" } } } ], "category": "vendor", "name": "Open Source" }, { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux", "product": { "name": "Red Hat Enterprise Linux", "product_id": "67646", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:-" } } } ], "category": "vendor", "name": "Red Hat" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux", "product": { "name": "SUSE Linux", "product_id": "T002207", "product_identification_helper": { "cpe": "cpe:/o:suse:suse_linux:-" } } } ], "category": "vendor", "name": "SUSE" }, { "branches": [ { "category": "product_name", "name": "Ubuntu Linux", "product": { "name": "Ubuntu Linux", "product_id": "T000126", "product_identification_helper": { "cpe": "cpe:/o:canonical:ubuntu_linux:-" } } } ], "category": "vendor", "name": "Ubuntu" } ] }, "vulnerabilities": [ { "cve": "CVE-2019-0196", "notes": [ { "category": "description", "text": "Es existiert eine Schwachstelle im Apache HTTP Server. In mod_http2 besteht ein read-after-free Fehler in einem String Vergleich. Ein entfernter anonymer Angreifer kann diese Schwachstelle ausnutzen, um einen Denial of Service zu verursachen." } ], "product_status": { "known_affected": [ "T015519", "2951", "T002207", "67646", "4871", "T000126", "7654", "T015844", "T013312", "T005119", "1727" ] }, "release_date": "2019-04-02T22:00:00Z", "title": "CVE-2019-0196" }, { "cve": "CVE-2019-0197", "notes": [ { "category": "description", "text": "Es existiert eine Schwachstelle im Apache HTTP Server. Diese besteht aufgrund unsachgem\u00e4\u00df behandelter Upgrade request from http/1.1 auf http/2 in mod_http2. Ein lokaler Angreifer kann diese Schwachstelle ausnutzen, um einen Denial of Service zu verursachen." } ], "product_status": { "known_affected": [ "2951", "T002207", "67646", "T015844", "T013312", "T005119", "1727" ] }, "release_date": "2019-04-02T22:00:00Z", "title": "CVE-2019-0197" }, { "cve": "CVE-2019-0211", "notes": [ { "category": "description", "text": "Es existiert eine Schwachstelle im Apache HTTP Server. Unter bestimmten Umst\u00e4nden kann Code, der in weniger privilegierten Kindprozessen oder Threads ausgef\u00fchrt wird, beliebigen Code mit den Privilegien des \u00fcbergeordneten Prozesses ausf\u00fchren. Ein lokaler Angreifer kann diese Schwachstelle durch Manipulation des Scoreboards ausnutzen, um seine Rechte zu erweitern." } ], "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "T015844", "T013312", "T005119", "1727" ] }, "release_date": "2019-04-02T22:00:00Z", "title": "CVE-2019-0211" }, { "cve": "CVE-2019-0215", "notes": [ { "category": "description", "text": "Es existiert eine Schwachstelle im Apache HTTP Server. Diese besteht aufgrund eines Fehlers in mod_ssl bei der Verifizierung von Client-Zertifikaten. Ein authentisierter Angreifer kann diese Schwachstelle ausnutzen, um Zugriffsbeschr\u00e4nkungen zu umgehen." } ], "product_status": { "known_affected": [ "2951", "67646", "T015844", "T013312", "T005119", "1727" ] }, "release_date": "2019-04-02T22:00:00Z", "title": "CVE-2019-0215" }, { "cve": "CVE-2019-0217", "notes": [ { "category": "description", "text": "Es existiert eine Schwachstelle im Apache HTTP Server. Es besteht eine Race Condition in mod_auth_digest w\u00e4hrend der Ausf\u00fchrung in einem Thread-Server. Ein authentisierter Angreifer kann kann diese Schwachstelle ausnutzen, um konfigurierte Zugriffsbeschr\u00e4nkungen zu umgehen und sich mit einem anderen Benutzernamen zu authentifizieren." } ], "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "T015844", "T013312", "T005119", "1727" ] }, "release_date": "2019-04-02T22:00:00Z", "title": "CVE-2019-0217" }, { "cve": "CVE-2019-0220", "notes": [ { "category": "description", "text": "Es existiert eine Schwachstelle im Apache HTTP Server. Diese besteht wegen einer unsachgem\u00e4\u00dfen Behandlung von regul\u00e4ren Ausdr\u00fccken in der Pfadkomponente einer Request-URL. Ein lokaler Angreifer kann diese Schwachstelle ausnutzen, um einen Denial of Service zu verursachen." } ], "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "7654", "T015844", "T013312", "T005119", "1727" ] }, "release_date": "2019-04-02T22:00:00Z", "title": "CVE-2019-0220" } ] }
wid-sec-w-2023-2047
Vulnerability from csaf_certbund
Published
2019-04-02 22:00
Modified
2023-08-13 22:00
Summary
Apache HTTP Server: Mehrere Schwachstellen
Notes
Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.
Produktbeschreibung
Apache ist ein Webserver für verschiedene Plattformen.
Angriff
Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann mehrere Schwachstellen im Apache HTTP Server ausnutzen, um seine Rechte zu erweitern, Sicherheitsrestriktionen zu umgehen oder um einen Denial of Service Angriff durchzuführen.
Betroffene Betriebssysteme
- UNIX
- Linux
- Windows
- NetApp Appliance
{ "document": { "aggregate_severity": { "text": "hoch" }, "category": "csaf_base", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "de-DE", "notes": [ { "category": "legal_disclaimer", "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen." }, { "category": "description", "text": "Apache ist ein Webserver f\u00fcr verschiedene Plattformen.", "title": "Produktbeschreibung" }, { "category": "summary", "text": "Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann mehrere Schwachstellen im Apache HTTP Server ausnutzen, um seine Rechte zu erweitern, Sicherheitsrestriktionen zu umgehen oder um einen Denial of Service Angriff durchzuf\u00fchren.", "title": "Angriff" }, { "category": "general", "text": "- UNIX\n- Linux\n- Windows\n- NetApp Appliance", "title": "Betroffene Betriebssysteme" } ], "publisher": { "category": "other", "contact_details": "csaf-provider@cert-bund.de", "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik", "namespace": "https://www.bsi.bund.de" }, "references": [ { "category": "self", "summary": "WID-SEC-W-2023-2047 - CSAF Version", "url": "https://wid.cert-bund.de/.well-known/csaf/white/2019/wid-sec-w-2023-2047.json" }, { "category": "self", "summary": "WID-SEC-2023-2047 - Portal Version", "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2023-2047" }, { "category": "external", "summary": "HPE Securi+y Bulletin", "url": "https://support.hpe.com/hpesc/public/docDisplay?docId=emr_na-hpesbst04494en_us" }, { "category": "external", "summary": "Eintr\u00e4ge in der OSS Mailing Liste vom 2019-04-02", "url": "https://seclists.org/oss-sec/2019/q2/0" }, { "category": "external", "summary": "Eintr\u00e4ge in der OSS Mailing Liste vom 2019-04-02", "url": "https://seclists.org/oss-sec/2019/q2/1" }, { "category": "external", "summary": "Eintr\u00e4ge in der OSS Mailing Liste vom 2019-04-02", "url": "https://seclists.org/oss-sec/2019/q2/2" }, { "category": "external", "summary": "Eintr\u00e4ge in der OSS Mailing Liste vom 2019-04-02", "url": "https://seclists.org/oss-sec/2019/q2/3" }, { "category": "external", "summary": "Eintr\u00e4ge in der OSS Mailing Liste vom 2019-04-02", "url": "https://seclists.org/oss-sec/2019/q2/4" }, { "category": "external", "summary": "Eintr\u00e4ge in der OSS Mailing Liste vom 2019-04-02", "url": "https://seclists.org/oss-sec/2019/q2/5" }, { "category": "external", "summary": "Apache Release Notes Stand 2019-04-02", "url": "https://httpd.apache.org/security/vulnerabilities_24.html" }, { "category": "external", "summary": "Debian Security Advisory DSA-4422 vom 2019-04-04 vom 2019-04-03", "url": "https://lists.debian.org/debian-security-announce/2019/msg00066.html" }, { "category": "external", "summary": "Ubuntu Security Notices USN-3937-1 vom 2019-04-04", "url": "https://usn.ubuntu.com/3937-1/" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2019:0878-1 vom 2019-04-04", "url": "https://www.suse.com/de-de/support/update/announcement/2019/suse-su-20190878-1/" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2019:0873-1 vom 2019-04-04", "url": "http://lists.suse.com/pipermail/sle-security-updates/2019-April/005295.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2019:0889-1 vom 2019-04-05", "url": "https://www.suse.com/support/update/announcement/2019/suse-su-20190889-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2019:0888-1 vom 2019-04-05", "url": "https://www.suse.com/support/update/announcement/2019/suse-su-20190888-1.html" }, { "category": "external", "summary": "Ubuntu Security Notice USN-3937-2 vom 2019-04-10", "url": "https://usn.ubuntu.com/3937-2/" }, { "category": "external", "summary": "Arch Linux Security Advisory ASA-201904-3 vom 2019-04-05", "url": "https://security.archlinux.org/ASA-201904-3" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2019:0746 vom 2019-04-11", "url": "https://access.redhat.com/errata/RHSA-2019:0746" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2019:0888-2 vom 2019-04-12", "url": "https://www.suse.com/support/update/announcement/2019/suse-su-20190888-2.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2020:0251 vom 2020-01-27", "url": "https://access.redhat.com/errata/RHSA-2020:0251" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2020:0250 vom 2020-01-27", "url": "https://access.redhat.com/errata/RHSA-2020:0250" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2019:0980 vom 2019-05-07", "url": "https://access.redhat.com/errata/RHSA-2019:0980" }, { "category": "external", "summary": "Exploit f\u00fcr CVE-2019-0211 vom 2019-05-16", "url": "https://github.com/cfreal/exploits/tree/master/CVE-2019-0211-apache" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2019:1296 vom 2019-05-30", "url": "https://access.redhat.com/errata/RHSA-2019:1296" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2019:1297 vom 2019-05-30", "url": "https://access.redhat.com/errata/RHSA-2019:1297" }, { "category": "external", "summary": "NetApp Security Advisory NTAP-20190423-0001 vom 2019-06-06", "url": "https://security.netapp.com/advisory/ntap-20190423-0001/" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2019:1543 vom 2019-06-19", "url": "https://access.redhat.com/errata/RHSA-2019:1543" }, { "category": "external", "summary": "NetApp Security Advisory NTAP-20190625-0007 vom 2019-06-25", "url": "https://security.netapp.com/advisory/ntap-20190625-0007/" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2019:2343 vom 2019-08-06", "url": "https://access.redhat.com/errata/RHSA-2019:2343" }, { "category": "external", "summary": "HP SECURITY BULLETIN hpesbux03950en_us vom 2019-08-22", "url": "https://support.hpe.com/hpsc/doc/public/display?docId=hpesbux03950en_us" }, { "category": "external", "summary": "Ubuntu Security Notice USN-4113-1 vom 2019-08-30", "url": "https://usn.ubuntu.com/4113-1/" }, { "category": "external", "summary": "Ubuntu Security Notice USN-4113-2 vom 2019-09-17", "url": "https://usn.ubuntu.com/4113-2/" }, { "category": "external", "summary": "CentOS Security Advisory CESA-2019:2343 vom 2019-09-18", "url": "http://centos-announce.2309468.n4.nabble.com/CentOS-announce-CESA-2019-2343-Moderate-CentOS-7-httpd-Security-Update-tp4645680.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2019:3436 vom 2019-11-05", "url": "https://access.redhat.com/errata/RHSA-2019:3436" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2019:3933 vom 2019-11-20", "url": "https://access.redhat.com/errata/RHSA-2019:3933" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2019:3935 vom 2019-11-20", "url": "https://access.redhat.com/errata/RHSA-2019:3935" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2019:3932 vom 2019-11-20", "url": "https://access.redhat.com/errata/RHSA-2019:3932" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2019:4126 vom 2019-12-10", "url": "https://access.redhat.com/errata/RHSA-2019:4126" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2020:2644 vom 2020-06-22", "url": "https://access.redhat.com/errata/RHSA-2020:2644" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2020:2646 vom 2020-06-22", "url": "https://access.redhat.com/errata/RHSA-2020:2646" }, { "category": "external", "summary": "Juniper Security Advisory JSA11023 vom 2020-07-08", "url": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA11023" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2020:4751 vom 2020-11-04", "url": "https://access.redhat.com/errata/RHSA-2020:4751" }, { "category": "external", "summary": "AVAYA Security Advisory ASA-2020-161 vom 2020-12-08", "url": "https://downloads.avaya.com/css/P8/documents/101072834" } ], "source_lang": "en-US", "title": "Apache HTTP Server: Mehrere Schwachstellen", "tracking": { "current_release_date": "2023-08-13T22:00:00.000+00:00", "generator": { "date": "2024-02-15T17:40:20.256+00:00", "engine": { "name": "BSI-WID", "version": "1.3.0" } }, "id": "WID-SEC-W-2023-2047", "initial_release_date": "2019-04-02T22:00:00.000+00:00", "revision_history": [ { "date": "2019-04-02T22:00:00.000+00:00", "number": "1", "summary": "Initiale Fassung" }, { "date": "2019-04-03T22:00:00.000+00:00", "number": "2", "summary": "Neue Updates von Debian und Fedora aufgenommen" }, { "date": "2019-04-04T22:00:00.000+00:00", "number": "3", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2019-04-04T22:00:00.000+00:00", "number": "4", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2019-04-04T22:00:00.000+00:00", "number": "5", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2019-04-07T22:00:00.000+00:00", "number": "6", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2019-04-10T22:00:00.000+00:00", "number": "7", "summary": "Neue Updates von Ubuntu und Arch Linux aufgenommen" }, { "date": "2019-04-11T22:00:00.000+00:00", "number": "8", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2019-04-14T22:00:00.000+00:00", "number": "9", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2019-04-22T22:00:00.000+00:00", "number": "10", "summary": "Referenz(en) aufgenommen: GLSA/201904-20" }, { "date": "2019-05-06T22:00:00.000+00:00", "number": "11", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2019-05-16T22:00:00.000+00:00", "number": "12", "summary": "Exploit aufgenommen" }, { "date": "2019-05-23T22:00:00.000+00:00", "number": "13", "summary": "Referenz(en) aufgenommen: FEDORA-2019-B99E48E883, FEDORA-2019-08E57D15FD" }, { "date": "2019-05-30T22:00:00.000+00:00", "number": "14", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2019-05-30T22:00:00.000+00:00", "number": "15", "summary": "Referenz(en) aufgenommen: FEDORA-2019-C7187E6DC7" }, { "date": "2019-06-02T22:00:00.000+00:00", "number": "16", "summary": "Schreibfehler korrigiert" }, { "date": "2019-06-06T22:00:00.000+00:00", "number": "17", "summary": "Neue Updates von NetApp aufgenommen" }, { "date": "2019-06-18T22:00:00.000+00:00", "number": "18", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2019-06-24T22:00:00.000+00:00", "number": "19", "summary": "Neue Updates von NetApp aufgenommen" }, { "date": "2019-08-06T22:00:00.000+00:00", "number": "20", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2019-08-25T22:00:00.000+00:00", "number": "21", "summary": "Neue Updates von HP aufgenommen" }, { "date": "2019-08-29T22:00:00.000+00:00", "number": "22", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2019-09-17T22:00:00.000+00:00", "number": "23", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2019-09-18T22:00:00.000+00:00", "number": "24", "summary": "Neue Updates von CentOS aufgenommen" }, { "date": "2019-11-05T23:00:00.000+00:00", "number": "25", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2019-11-20T23:00:00.000+00:00", "number": "26", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2019-12-09T23:00:00.000+00:00", "number": "27", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2020-01-27T23:00:00.000+00:00", "number": "28", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2020-06-22T22:00:00.000+00:00", "number": "29", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2020-07-08T22:00:00.000+00:00", "number": "30", "summary": "Neue Updates von Juniper aufgenommen" }, { "date": "2020-11-03T23:00:00.000+00:00", "number": "31", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2020-12-09T23:00:00.000+00:00", "number": "32", "summary": "Neue Updates von AVAYA aufgenommen" }, { "date": "2023-08-13T22:00:00.000+00:00", "number": "33", "summary": "Neue Updates von HP aufgenommen" } ], "status": "final", "version": "33" } }, "product_tree": { "branches": [ { "branches": [ { "category": "product_name", "name": "Apache HTTP Server \u003c 2.4.39", "product": { "name": "Apache HTTP Server \u003c 2.4.39", "product_id": "T013862", "product_identification_helper": { "cpe": "cpe:/a:apache:http_server:2.4.39" } } } ], "category": "vendor", "name": "Apache" }, { "branches": [ { "category": "product_name", "name": "Avaya Aura Experience Portal", "product": { "name": "Avaya Aura Experience Portal", "product_id": "T015519", "product_identification_helper": { "cpe": "cpe:/a:avaya:aura_experience_portal:-" } } } ], "category": "vendor", "name": "Avaya" }, { "branches": [ { "category": "product_name", "name": "Broadcom Brocade Switch", "product": { "name": "Broadcom Brocade Switch", "product_id": "T015844", "product_identification_helper": { "cpe": "cpe:/h:brocade:switch:-" } } } ], "category": "vendor", "name": "Broadcom" }, { "branches": [ { "category": "product_name", "name": "Debian Linux", "product": { "name": "Debian Linux", "product_id": "2951", "product_identification_helper": { "cpe": "cpe:/o:debian:debian_linux:-" } } } ], "category": "vendor", "name": "Debian" }, { "branches": [ { "category": "product_name", "name": "HPE HP-UX", "product": { "name": "HPE HP-UX", "product_id": "4871", "product_identification_helper": { "cpe": "cpe:/o:hp:hp-ux:-" } } }, { "category": "product_name", "name": "HPE Switch", "product": { "name": "HPE Switch", "product_id": "T005119", "product_identification_helper": { "cpe": "cpe:/h:hp:switch:-" } } } ], "category": "vendor", "name": "HPE" }, { "branches": [ { "category": "product_name", "name": "Juniper Junos Space \u003c 20.1R1", "product": { "name": "Juniper Junos Space \u003c 20.1R1", "product_id": "T016874", "product_identification_helper": { "cpe": "cpe:/a:juniper:junos_space:20.1r1" } } } ], "category": "vendor", "name": "Juniper" }, { "branches": [ { "category": "product_name", "name": "NetApp Data ONTAP", "product": { "name": "NetApp Data ONTAP", "product_id": "7654", "product_identification_helper": { "cpe": "cpe:/a:netapp:data_ontap:-" } } } ], "category": "vendor", "name": "NetApp" }, { "branches": [ { "category": "product_name", "name": "Open Source Arch Linux", "product": { "name": "Open Source Arch Linux", "product_id": "T013312", "product_identification_helper": { "cpe": "cpe:/o:archlinux:archlinux:-" } } }, { "category": "product_name", "name": "Open Source CentOS", "product": { "name": "Open Source CentOS", "product_id": "1727", "product_identification_helper": { "cpe": "cpe:/o:centos:centos:-" } } } ], "category": "vendor", "name": "Open Source" }, { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux", "product": { "name": "Red Hat Enterprise Linux", "product_id": "67646", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:-" } } } ], "category": "vendor", "name": "Red Hat" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux", "product": { "name": "SUSE Linux", "product_id": "T002207", "product_identification_helper": { "cpe": "cpe:/o:suse:suse_linux:-" } } } ], "category": "vendor", "name": "SUSE" }, { "branches": [ { "category": "product_name", "name": "Ubuntu Linux", "product": { "name": "Ubuntu Linux", "product_id": "T000126", "product_identification_helper": { "cpe": "cpe:/o:canonical:ubuntu_linux:-" } } } ], "category": "vendor", "name": "Ubuntu" } ] }, "vulnerabilities": [ { "cve": "CVE-2019-0196", "notes": [ { "category": "description", "text": "Es existiert eine Schwachstelle im Apache HTTP Server. In mod_http2 besteht ein read-after-free Fehler in einem String Vergleich. Ein entfernter anonymer Angreifer kann diese Schwachstelle ausnutzen, um einen Denial of Service zu verursachen." } ], "product_status": { "known_affected": [ "T015519", "2951", "T002207", "67646", "4871", "T000126", "7654", "T015844", "T013312", "T005119", "1727" ] }, "release_date": "2019-04-02T22:00:00Z", "title": "CVE-2019-0196" }, { "cve": "CVE-2019-0197", "notes": [ { "category": "description", "text": "Es existiert eine Schwachstelle im Apache HTTP Server. Diese besteht aufgrund unsachgem\u00e4\u00df behandelter Upgrade request from http/1.1 auf http/2 in mod_http2. Ein lokaler Angreifer kann diese Schwachstelle ausnutzen, um einen Denial of Service zu verursachen." } ], "product_status": { "known_affected": [ "2951", "T002207", "67646", "T015844", "T013312", "T005119", "1727" ] }, "release_date": "2019-04-02T22:00:00Z", "title": "CVE-2019-0197" }, { "cve": "CVE-2019-0211", "notes": [ { "category": "description", "text": "Es existiert eine Schwachstelle im Apache HTTP Server. Unter bestimmten Umst\u00e4nden kann Code, der in weniger privilegierten Kindprozessen oder Threads ausgef\u00fchrt wird, beliebigen Code mit den Privilegien des \u00fcbergeordneten Prozesses ausf\u00fchren. Ein lokaler Angreifer kann diese Schwachstelle durch Manipulation des Scoreboards ausnutzen, um seine Rechte zu erweitern." } ], "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "T015844", "T013312", "T005119", "1727" ] }, "release_date": "2019-04-02T22:00:00Z", "title": "CVE-2019-0211" }, { "cve": "CVE-2019-0215", "notes": [ { "category": "description", "text": "Es existiert eine Schwachstelle im Apache HTTP Server. Diese besteht aufgrund eines Fehlers in mod_ssl bei der Verifizierung von Client-Zertifikaten. Ein authentisierter Angreifer kann diese Schwachstelle ausnutzen, um Zugriffsbeschr\u00e4nkungen zu umgehen." } ], "product_status": { "known_affected": [ "2951", "67646", "T015844", "T013312", "T005119", "1727" ] }, "release_date": "2019-04-02T22:00:00Z", "title": "CVE-2019-0215" }, { "cve": "CVE-2019-0217", "notes": [ { "category": "description", "text": "Es existiert eine Schwachstelle im Apache HTTP Server. Es besteht eine Race Condition in mod_auth_digest w\u00e4hrend der Ausf\u00fchrung in einem Thread-Server. Ein authentisierter Angreifer kann kann diese Schwachstelle ausnutzen, um konfigurierte Zugriffsbeschr\u00e4nkungen zu umgehen und sich mit einem anderen Benutzernamen zu authentifizieren." } ], "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "T015844", "T013312", "T005119", "1727" ] }, "release_date": "2019-04-02T22:00:00Z", "title": "CVE-2019-0217" }, { "cve": "CVE-2019-0220", "notes": [ { "category": "description", "text": "Es existiert eine Schwachstelle im Apache HTTP Server. Diese besteht wegen einer unsachgem\u00e4\u00dfen Behandlung von regul\u00e4ren Ausdr\u00fccken in der Pfadkomponente einer Request-URL. Ein lokaler Angreifer kann diese Schwachstelle ausnutzen, um einen Denial of Service zu verursachen." } ], "product_status": { "known_affected": [ "2951", "T002207", "67646", "T000126", "7654", "T015844", "T013312", "T005119", "1727" ] }, "release_date": "2019-04-02T22:00:00Z", "title": "CVE-2019-0220" } ] }
gsd-2019-0215
Vulnerability from gsd
Modified
2023-12-13 01:23
Details
In Apache HTTP Server 2.4 releases 2.4.37 and 2.4.38, a bug in mod_ssl when using per-location client certificate verification with TLSv1.3 allowed a client to bypass configured access control restrictions.
Aliases
Aliases
{ "GSD": { "alias": "CVE-2019-0215", "description": "In Apache HTTP Server 2.4 releases 2.4.37 and 2.4.38, a bug in mod_ssl when using per-location client certificate verification with TLSv1.3 allowed a client to bypass configured access control restrictions.", "id": "GSD-2019-0215", "references": [ "https://www.suse.com/security/cve/CVE-2019-0215.html", "https://access.redhat.com/errata/RHSA-2019:0980", "https://security.archlinux.org/CVE-2019-0215", "https://alas.aws.amazon.com/cve/html/CVE-2019-0215.html", "https://linux.oracle.com/cve/CVE-2019-0215.html" ] }, "gsd": { "metadata": { "exploitCode": "unknown", "remediation": "unknown", "reportConfidence": "confirmed", "type": "vulnerability" }, "osvSchema": { "aliases": [ "CVE-2019-0215" ], "details": "In Apache HTTP Server 2.4 releases 2.4.37 and 2.4.38, a bug in mod_ssl when using per-location client certificate verification with TLSv1.3 allowed a client to bypass configured access control restrictions.", "id": "GSD-2019-0215", "modified": "2023-12-13T01:23:39.701717Z", "schema_version": "1.4.0" } }, "namespaces": { "cve.org": { "CVE_data_meta": { "ASSIGNER": "security@apache.org", "ID": "CVE-2019-0215", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Apache HTTP Server", "version": { "version_data": [ { "version_value": "2.4.37" }, { "version_value": "2.4.38" } ] } } ] }, "vendor_name": "Apache" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "In Apache HTTP Server 2.4 releases 2.4.37 and 2.4.38, a bug in mod_ssl when using per-location client certificate verification with TLSv1.3 allowed a client to bypass configured access control restrictions." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Access Control Bypass" } ] } ] }, "references": { "reference_data": [ { "name": "[oss-security] 20190401 CVE-2019-0215: mod_ssl access control bypass", "refsource": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2019/04/02/4" }, { "name": "[httpd-cvs] 20190402 svn commit: r1856807 - /httpd/test/framework/trunk/t/security/CVE-2019-0215.t", "refsource": "MLIST", "url": "https://lists.apache.org/thread.html/2d6bd429a0ba9af1580da896575cfca6e42bb05e7536562d4b095fcf@%3Ccvs.httpd.apache.org%3E" }, { "name": "107667", "refsource": "BID", "url": "http://www.securityfocus.com/bid/107667" }, { "name": "FEDORA-2019-cf7695b470", "refsource": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WETXNQWNQLWHV6XNW6YTO5UGDTIWAQGT/" }, { "name": "FEDORA-2019-119b14075a", "refsource": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EZRMTEIGZKYFNGIDOTXN3GNEJTLVCYU7/" }, { "name": "https://httpd.apache.org/security/vulnerabilities_24.html", "refsource": "MISC", "url": "https://httpd.apache.org/security/vulnerabilities_24.html" }, { "name": "https://support.f5.com/csp/article/K59440504", "refsource": "CONFIRM", "url": "https://support.f5.com/csp/article/K59440504" }, { "name": "https://security.netapp.com/advisory/ntap-20190423-0001/", "refsource": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20190423-0001/" }, { "name": "RHSA-2019:0980", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2019:0980" }, { "name": "FEDORA-2019-a4ed7400f4", "refsource": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ALIR5S3O7NRHEGFMIDMUSYQIZOE4TJJN/" }, { "name": "https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html", "refsource": "MISC", "url": "https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html" }, { "name": "[httpd-dev] 20190804 Re: svn commit: r1856807 - /httpd/test/framework/trunk/t/security/CVE-2019-0215.t", "refsource": "MLIST", "url": "https://lists.apache.org/thread.html/117bc3f09847ebf020b1bb70301ebcc105ddc446856150b63f37f8eb@%3Cdev.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20190806 svn commit: r1864463 - /httpd/test/framework/trunk/t/security/CVE-2019-0215.t", "refsource": "MLIST", "url": "https://lists.apache.org/thread.html/bc1a6d4137798565ab02e60079b6788442147f4efeb4200c665bed5b@%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-dev] 20190806 Re: svn commit: r1856807 - /httpd/test/framework/trunk/t/security/CVE-2019-0215.t", "refsource": "MLIST", "url": "https://lists.apache.org/thread.html/5b1e7d66c5adf286f14f6cc0f857b6fca107444f68aed9e70eedab47@%3Cdev.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20190815 svn commit: r1048743 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html", "refsource": "MLIST", "url": "https://lists.apache.org/thread.html/56c2e7cc9deb1c12a843d0dc251ea7fd3e7e80293cde02fcd65286ba@%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20190815 svn commit: r1048742 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html", "refsource": "MLIST", "url": "https://lists.apache.org/thread.html/84a3714f0878781f6ed84473d1a503d2cc382277e100450209231830@%3Ccvs.httpd.apache.org%3E" }, { "name": "https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html", "refsource": "MISC", "url": "https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html" }, { "name": "https://www.oracle.com/security-alerts/cpujan2020.html", "refsource": "MISC", "url": "https://www.oracle.com/security-alerts/cpujan2020.html" }, { "name": "[httpd-cvs] 20200401 svn commit: r1058586 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html", "refsource": "MLIST", "url": "https://lists.apache.org/thread.html/rd18c3c43602e66f9cdcf09f1de233804975b9572b0456cc582390b6f@%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20200401 svn commit: r1058587 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html", "refsource": "MLIST", "url": "https://lists.apache.org/thread.html/re3d27b6250aa8548b8845d314bb8a350b3df326cacbbfdfe4d455234@%3Ccvs.httpd.apache.org%3E" }, { "name": "https://www.oracle.com/security-alerts/cpuapr2020.html", "refsource": "MISC", "url": "https://www.oracle.com/security-alerts/cpuapr2020.html" }, { "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/", "refsource": "MLIST", "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20210330 svn commit: r1073143 [3/3] - in /websites/staging/httpd/trunk/content: ./ security/", "refsource": "MLIST", "url": "https://lists.apache.org/thread.html/r06f0d87ebb6d59ed8379633f36f72f5b1f79cadfda72ede0830b42cf@%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20210330 svn commit: r1073140 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html", "refsource": "MLIST", "url": "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20210330 svn commit: r1073139 [12/13] - in /websites/staging/httpd/trunk/content: ./ security/json/", "refsource": "MLIST", "url": "https://lists.apache.org/thread.html/r03ee478b3dda3e381fd6189366fa7af97c980d2f602846eef935277d@%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20210330 svn commit: r1888194 [12/13] - /httpd/site/trunk/content/security/json/", "refsource": "MLIST", "url": "https://lists.apache.org/thread.html/rd2fb621142e7fa187cfe12d7137bf66e7234abcbbcd800074c84a538@%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20210330 svn commit: r1073149 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/", "refsource": "MLIST", "url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20210330 svn commit: r1073149 [12/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/", "refsource": "MLIST", "url": "https://lists.apache.org/thread.html/re473305a65b4db888e3556e4dae10c2a04ee89dcff2e26ecdbd860a9@%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20210606 svn commit: r1075470 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/json/CVE-2020-13938.json security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html", "refsource": "MLIST", "url": "https://lists.apache.org/thread.html/r76142b8c5119df2178be7c2dba88fde552eedeec37ea993dfce68d1d@%3Ccvs.httpd.apache.org%3E" } ] } }, "nvd.nist.gov": { "configurations": { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:apache:http_server:2.4.37:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:http_server:2.4.38:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:fedoraproject:fedora:29:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] }, "cve": { "CVE_data_meta": { "ASSIGNER": "security@apache.org", "ID": "CVE-2019-0215" }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "en", "value": "In Apache HTTP Server 2.4 releases 2.4.37 and 2.4.38, a bug in mod_ssl when using per-location client certificate verification with TLSv1.3 allowed a client to bypass configured access control restrictions." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ] } ] }, "references": { "reference_data": [ { "name": "FEDORA-2019-cf7695b470", "refsource": "FEDORA", "tags": [ "Third Party Advisory" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WETXNQWNQLWHV6XNW6YTO5UGDTIWAQGT/" }, { "name": "FEDORA-2019-119b14075a", "refsource": "FEDORA", "tags": [ "Third Party Advisory" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EZRMTEIGZKYFNGIDOTXN3GNEJTLVCYU7/" }, { "name": "[httpd-cvs] 20190402 svn commit: r1856807 - /httpd/test/framework/trunk/t/security/CVE-2019-0215.t", "refsource": "MLIST", "tags": [ "Mailing List", "Exploit", "Vendor Advisory" ], "url": "https://lists.apache.org/thread.html/2d6bd429a0ba9af1580da896575cfca6e42bb05e7536562d4b095fcf@%3Ccvs.httpd.apache.org%3E" }, { "name": "https://httpd.apache.org/security/vulnerabilities_24.html", "refsource": "MISC", "tags": [ "Vendor Advisory" ], "url": "https://httpd.apache.org/security/vulnerabilities_24.html" }, { "name": "107667", "refsource": "BID", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/107667" }, { "name": "[oss-security] 20190401 CVE-2019-0215: mod_ssl access control bypass", "refsource": "MLIST", "tags": [ "Mailing List", "Mitigation", "Third Party Advisory" ], "url": "http://www.openwall.com/lists/oss-security/2019/04/02/4" }, { "name": "https://support.f5.com/csp/article/K59440504", "refsource": "CONFIRM", "tags": [ "Third Party Advisory" ], "url": "https://support.f5.com/csp/article/K59440504" }, { "name": "https://security.netapp.com/advisory/ntap-20190423-0001/", "refsource": "CONFIRM", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20190423-0001/" }, { "name": "RHSA-2019:0980", "refsource": "REDHAT", "tags": [], "url": "https://access.redhat.com/errata/RHSA-2019:0980" }, { "name": "FEDORA-2019-a4ed7400f4", "refsource": "FEDORA", "tags": [], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ALIR5S3O7NRHEGFMIDMUSYQIZOE4TJJN/" }, { "name": "https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html", "refsource": "MISC", "tags": [], "url": "https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html" }, { "name": "[httpd-dev] 20190804 Re: svn commit: r1856807 - /httpd/test/framework/trunk/t/security/CVE-2019-0215.t", "refsource": "MLIST", "tags": [], "url": "https://lists.apache.org/thread.html/117bc3f09847ebf020b1bb70301ebcc105ddc446856150b63f37f8eb@%3Cdev.httpd.apache.org%3E" }, { "name": "[httpd-dev] 20190806 Re: svn commit: r1856807 - /httpd/test/framework/trunk/t/security/CVE-2019-0215.t", "refsource": "MLIST", "tags": [], "url": "https://lists.apache.org/thread.html/5b1e7d66c5adf286f14f6cc0f857b6fca107444f68aed9e70eedab47@%3Cdev.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20190806 svn commit: r1864463 - /httpd/test/framework/trunk/t/security/CVE-2019-0215.t", "refsource": "MLIST", "tags": [], "url": "https://lists.apache.org/thread.html/bc1a6d4137798565ab02e60079b6788442147f4efeb4200c665bed5b@%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20190815 svn commit: r1048743 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html", "refsource": "MLIST", "tags": [], "url": "https://lists.apache.org/thread.html/56c2e7cc9deb1c12a843d0dc251ea7fd3e7e80293cde02fcd65286ba@%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20190815 svn commit: r1048742 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html", "refsource": "MLIST", "tags": [], "url": "https://lists.apache.org/thread.html/84a3714f0878781f6ed84473d1a503d2cc382277e100450209231830@%3Ccvs.httpd.apache.org%3E" }, { "name": "https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html", "refsource": "MISC", "tags": [], "url": "https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html" }, { "name": "https://www.oracle.com/security-alerts/cpujan2020.html", "refsource": "MISC", "tags": [], "url": "https://www.oracle.com/security-alerts/cpujan2020.html" }, { "name": "[httpd-cvs] 20200401 svn commit: r1058586 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html", "refsource": "MLIST", "tags": [], "url": "https://lists.apache.org/thread.html/rd18c3c43602e66f9cdcf09f1de233804975b9572b0456cc582390b6f@%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20200401 svn commit: r1058587 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html", "refsource": "MLIST", "tags": [], "url": "https://lists.apache.org/thread.html/re3d27b6250aa8548b8845d314bb8a350b3df326cacbbfdfe4d455234@%3Ccvs.httpd.apache.org%3E" }, { "name": "N/A", "refsource": "N/A", "tags": [], "url": "https://www.oracle.com/security-alerts/cpuapr2020.html" }, { "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/", "refsource": "MLIST", "tags": [], "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20210330 svn commit: r1073140 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html", "refsource": "MLIST", "tags": [], "url": "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20210330 svn commit: r1073149 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/", "refsource": "MLIST", "tags": [], "url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20210330 svn commit: r1888194 [12/13] - /httpd/site/trunk/content/security/json/", "refsource": "MLIST", "tags": [], "url": "https://lists.apache.org/thread.html/rd2fb621142e7fa187cfe12d7137bf66e7234abcbbcd800074c84a538@%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20210330 svn commit: r1073143 [3/3] - in /websites/staging/httpd/trunk/content: ./ security/", "refsource": "MLIST", "tags": [], "url": "https://lists.apache.org/thread.html/r06f0d87ebb6d59ed8379633f36f72f5b1f79cadfda72ede0830b42cf@%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20210330 svn commit: r1073139 [12/13] - in /websites/staging/httpd/trunk/content: ./ security/json/", "refsource": "MLIST", "tags": [], "url": "https://lists.apache.org/thread.html/r03ee478b3dda3e381fd6189366fa7af97c980d2f602846eef935277d@%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20210330 svn commit: r1073149 [12/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/", "refsource": "MLIST", "tags": [], "url": "https://lists.apache.org/thread.html/re473305a65b4db888e3556e4dae10c2a04ee89dcff2e26ecdbd860a9@%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20210606 svn commit: r1075470 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/json/CVE-2020-13938.json security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html", "refsource": "MLIST", "tags": [], "url": "https://lists.apache.org/thread.html/r76142b8c5119df2178be7c2dba88fde552eedeec37ea993dfce68d1d@%3Ccvs.httpd.apache.org%3E" } ] } }, "impact": { "baseMetricV2": { "acInsufInfo": false, "cvssV2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:S/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 6.8, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "userInteractionRequired": false }, "baseMetricV3": { "cvssV3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "exploitabilityScore": 1.6, "impactScore": 5.9 } }, "lastModifiedDate": "2021-06-06T11:15Z", "publishedDate": "2019-04-08T20:29Z" } } }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.